Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe
-
Size
420KB
-
MD5
1ffc76c6f52e1e4237b16f640e964930
-
SHA1
f2a77e6693ab756d141fa871921c6767c526ac92
-
SHA256
1921dcbe0bb0df618125a1f800e947dc379749ad4e1b7cb6aa0db34392e0c2ba
-
SHA512
b7a6385c0bf58c00f9b74d201c67924e20e0459eeff2aa817e32e735aab9aabc8002d95a8553bea39aa7e6949fc27566a51e146ad88efd21480015fdba6cb359
-
SSDEEP
12288:uplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:axRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1792 French.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 1976 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\American\French.exe 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1976 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 1976 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 1976 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 1976 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 1792 French.exe 1792 French.exe 1792 French.exe 1792 French.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1792 1976 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 28 PID 1976 wrote to memory of 1792 1976 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 28 PID 1976 wrote to memory of 1792 1976 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 28 PID 1976 wrote to memory of 1792 1976 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\American\French.exe"C:\Program Files\American\French.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD557be3413771d887bb70579e83fd1ee3a
SHA142bd840307d55f282cadb41646fbfc7a0bf95ad5
SHA2567933f21c4bed74fe31ce02cb9b8f8dd38d2d5eda392a8b709a5c4aa6846beb03
SHA5126a8045454899cc6980ddefb6da5635cd4cf58c0b483b8bdb0235aad6d51cf573b65ea23a707aac9515d2dcb3b8fc175dcf28d51de8be4c494d93e8970f08d03b