Analysis
-
max time kernel
141s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe
-
Size
420KB
-
MD5
1ffc76c6f52e1e4237b16f640e964930
-
SHA1
f2a77e6693ab756d141fa871921c6767c526ac92
-
SHA256
1921dcbe0bb0df618125a1f800e947dc379749ad4e1b7cb6aa0db34392e0c2ba
-
SHA512
b7a6385c0bf58c00f9b74d201c67924e20e0459eeff2aa817e32e735aab9aabc8002d95a8553bea39aa7e6949fc27566a51e146ad88efd21480015fdba6cb359
-
SSDEEP
12288:uplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:axRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1200 Brazil.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\ortuguese\Brazil.exe 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4048 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 4048 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 4048 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 4048 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 1200 Brazil.exe 1200 Brazil.exe 1200 Brazil.exe 1200 Brazil.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4048 wrote to memory of 1200 4048 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 92 PID 4048 wrote to memory of 1200 4048 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 92 PID 4048 wrote to memory of 1200 4048 2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_1ffc76c6f52e1e4237b16f640e964930_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Program Files\ortuguese\Brazil.exe"C:\Program Files\ortuguese\Brazil.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3096 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:3484
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD536bbc246790b2aceeabbd36a96300a80
SHA13a3cc63ae75b076dc6fb5e888f869d815bb67597
SHA256a65a1dcc09de1341e9e328625b024b27f250c1d4ee815722e1f5a92a9e456fc1
SHA512c8d3f7314b4fc977e73586a0ddded36fcc26bccb85ccae71df091d8a5d33e8b91f4bbfcbf0a7c43955e899ff027d7ab7841b953d8d8cebe1e959039a7a89dcd2