Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe
-
Size
422KB
-
MD5
5af9110e7bc40ee9813873a0698d722d
-
SHA1
d591f36bbb87e01711e1f1598a08d8570cdb9667
-
SHA256
7feabbdc6f1cfa128654b5d134b3ced7750514040263f5c332d2e00e0f3e8aad
-
SHA512
cdfc78368aa1b4b2dff65320a638388096d3591cf87738ad048e98a694185efec982e84ad42f5e6c39270912f990e6ab5c5a9fb99e843947ceb40829f9bd557c
-
SSDEEP
12288:xplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:DxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4048 progress.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\agreement\progress.exe 2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1964 2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe 1964 2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe 1964 2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe 1964 2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe 4048 progress.exe 4048 progress.exe 4048 progress.exe 4048 progress.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1964 wrote to memory of 4048 1964 2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe 88 PID 1964 wrote to memory of 4048 1964 2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe 88 PID 1964 wrote to memory of 4048 1964 2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-17_5af9110e7bc40ee9813873a0698d722d_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files\agreement\progress.exe"C:\Program Files\agreement\progress.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD54ac8e5ea1541b469d878bd96c784a408
SHA1f1c3bc3b7c597adfd02bbd2fb46ec364ee9a1ae0
SHA25620f3e0522d388f2b6b3b163c799ee10518412e32812bac171aa476fd85ca0cfe
SHA5120376a61d51a9b6e89e337b5a1d832268a0540c7bf99f5bff82d87a25104b62bc329ae1341cf10ab90eec18aa00722af8802747407b62f6bd7b0de1f1c871e170