Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe
-
Size
4.3MB
-
MD5
25dc67ca4353514ec40adcc46858e4d1
-
SHA1
870dedf6c928b71880508e5ec128ce7bf939549f
-
SHA256
dfd21b2d305c358c599e25638d586dfa96d2f23fc5fda5dc3a36e6aa0f80a0c4
-
SHA512
5fe673862dff371938d910c1071d3df67fd067c6a9b3c4790a3bf9b2aa1037ff493947049420ae3e112daac15e87c6c0e28c369c7b75d3d5594b9b9cda885cb8
-
SSDEEP
49152:3vbfTBXw1Wc0FP7buLZj3FKAOmnD3MIn+s8KuqGaX0ToIBAUZLYBvVHwk0I:fLTBA1IhbuLZ0ArD3sJBAUZLeVQkV
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 26 IoCs
resource yara_rule behavioral1/memory/2104-4-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-39-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-37-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-42-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-35-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-33-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-31-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-29-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-27-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-44-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-25-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-23-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-46-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-21-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-19-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-17-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-15-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-13-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-11-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-9-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-7-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-6-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-5-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-48-0x00000000002F0000-0x000000000032E000-memory.dmp UPX behavioral1/memory/2104-49-0x0000000000400000-0x00000000008A1000-memory.dmp UPX behavioral1/memory/2104-50-0x00000000002F0000-0x000000000032E000-memory.dmp UPX -
resource yara_rule behavioral1/memory/2104-4-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-39-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-37-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-42-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-35-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-33-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-31-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-29-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-27-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-44-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-25-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-23-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-46-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-21-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-19-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-17-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-15-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-13-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-11-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-9-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-7-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-6-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-5-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-48-0x00000000002F0000-0x000000000032E000-memory.dmp upx behavioral1/memory/2104-50-0x00000000002F0000-0x000000000032E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2556 2104 WerFault.exe 27 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2104 2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe 2104 2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe 2104 2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2556 2104 2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe 28 PID 2104 wrote to memory of 2556 2104 2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe 28 PID 2104 wrote to memory of 2556 2104 2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe 28 PID 2104 wrote to memory of 2556 2104 2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-17_25dc67ca4353514ec40adcc46858e4d1_hacktools_icedid.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 3442⤵
- Program crash
PID:2556
-