Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe
-
Size
285KB
-
MD5
089e0e805c64dc5720b22ef03d8f6acb
-
SHA1
07bd24b49dcb02da349bc691db9f9e75c3e3844c
-
SHA256
b03ece9ca34112bb3aa4ebaf19a98de4e40af0b0fbc38f789cf4718b1f308ed2
-
SHA512
be3cd3ddc2f66796dc714ade296cbcc2fbfa6a3ef00c0a26618c6673919c92b66ab3a2ac06a5a3cb7261fe79bab651b003bfaa2e053b43dcc53aa9b615b47ac3
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1804 Debugging.exe -
Loads dropped DLL 2 IoCs
pid Process 2052 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe 2052 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Education\Debugging.exe 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe File opened for modification C:\Program Files\Education\Debugging.exe 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2052 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe 2052 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe 2052 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe 2052 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe 1804 Debugging.exe 1804 Debugging.exe 1804 Debugging.exe 1804 Debugging.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1804 2052 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe 28 PID 2052 wrote to memory of 1804 2052 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe 28 PID 2052 wrote to memory of 1804 2052 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe 28 PID 2052 wrote to memory of 1804 2052 2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-18_089e0e805c64dc5720b22ef03d8f6acb_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files\Education\Debugging.exe"C:\Program Files\Education\Debugging.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD517b6ea8a77a729430d7972c5c5668527
SHA114b934673561858ea9e7caa3bd3da1e266663bf6
SHA256ad45c883ac09a339401615baff5eb142cdf52d68d3c1c645c3658ef348a7c8f7
SHA51241fc429677c4878b5924eb8acec1a269d66f8228f488e91f2ba270549bacd9b840e4e63561fd92ef1aed061cab171fa3d7c349855f0af3df23676421907d2a89