Analysis
-
max time kernel
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe
-
Size
585KB
-
MD5
df74420aacb0802582e077555ef23573
-
SHA1
7bcaab8213cb1882415170b1af97c73396901c44
-
SHA256
b8f87e5e1f03ccc98f079924488b7aeafb472d3df2b237addb543dfa084b3d41
-
SHA512
0079886d8e1e1e0755ac2fd0a5a2c2a26dfe5db02a27a6d64fa2ca745b78a7d3350d97a4731f8362538dac4fa3a9ccd17840b0be86d389601e926d9c2c6bce4d
-
SSDEEP
12288:bplrVbDdQaqdS/ofraFErH8uB2Wm0gXsNr5FU:NxRQ+Fucuvm0os
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4760 Size.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\theHelp\Size.exe 2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3868 2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe 3868 2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe 3868 2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe 3868 2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe 4760 Size.exe 4760 Size.exe 4760 Size.exe 4760 Size.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3868 wrote to memory of 4760 3868 2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe 87 PID 3868 wrote to memory of 4760 3868 2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe 87 PID 3868 wrote to memory of 4760 3868 2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-18_df74420aacb0802582e077555ef23573_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Program Files\theHelp\Size.exe"C:\Program Files\theHelp\Size.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4760
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
585KB
MD5a48bc599856dab8addf1db5975f538f2
SHA1271328e34448b04b7099e8f9003d0e24fddef0b6
SHA256034a7bf066487a1ddfbc7de3da7b88f6cdae98a1bbbad261df518936d3b0194e
SHA5122af8f594af17a84b3522d9b03df3c30d8ef2ba646fae26a81bcdf1e64812e506f6c25a258fd2efa3b453c090ddcee1a74b0fdf0cf56c820257984b7abe70d105