Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe
-
Size
272KB
-
MD5
e5674c8d24d23b4bb542c1def977cc77
-
SHA1
ac51b8f0af8053ff3b9bfc087baac03c88607380
-
SHA256
9c006ee2c3b3ce3a04cb20e114f480dc417bad9d2215636f7656e159300cfb98
-
SHA512
6aa5a5c2dc0dcda43c9c1082f0a547eac205667cec5e9ab8daf4a28ccaec6c59888317b5e01e5fbe6746d922af752cf1bc5b5efd40fd1c8ca31b2eaf5cf33019
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 distribution.exe -
Loads dropped DLL 2 IoCs
pid Process 2484 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe 2484 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\platforms\distribution.exe 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe File opened for modification C:\Program Files\platforms\distribution.exe 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2484 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe 2484 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe 2484 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe 2484 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe 3036 distribution.exe 3036 distribution.exe 3036 distribution.exe 3036 distribution.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3036 2484 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe 28 PID 2484 wrote to memory of 3036 2484 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe 28 PID 2484 wrote to memory of 3036 2484 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe 28 PID 2484 wrote to memory of 3036 2484 2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_e5674c8d24d23b4bb542c1def977cc77_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files\platforms\distribution.exe"C:\Program Files\platforms\distribution.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5d3e828ce0ed94271aa67280b935af717
SHA1936a4d7bd791e995af049b8a914c50df2852984b
SHA2565635f2d013a2d7a7492c8f028649c42d07b4ad901e449e8c352f9eb794450929
SHA5129bd36da4fd483a7f2b0f7c76790af64656fe97c595d91d2a687806b83180ce9c7199f9b905b21133344ee5d3393c7da6496b5ca7e7e5b86e8fac53829f0fafe9