Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe
-
Size
274KB
-
MD5
94c11ea258bbc6f24741962c9ba41b40
-
SHA1
2fa11ff1e33d1eff69571a8a9fc9a2751fb4c2f6
-
SHA256
a2a677282b354819e6c728077b12a8f75473455c6c9a67f29c634ad0f4b95c15
-
SHA512
6927d51f74533d56263918262e9bea05a538272e9eff09d96ef8456073eb879dd7f5d5774c5185992ea21bf5ede5b870386efc0fa7885bfd0ecd00ed6ed39181
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 908 Kaufmann.exe -
Loads dropped DLL 2 IoCs
pid Process 2844 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe 2844 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Morgan\Kaufmann.exe 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe File opened for modification C:\Program Files\Morgan\Kaufmann.exe 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2844 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe 2844 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe 2844 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe 2844 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe 908 Kaufmann.exe 908 Kaufmann.exe 908 Kaufmann.exe 908 Kaufmann.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 908 2844 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe 28 PID 2844 wrote to memory of 908 2844 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe 28 PID 2844 wrote to memory of 908 2844 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe 28 PID 2844 wrote to memory of 908 2844 2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-19_94c11ea258bbc6f24741962c9ba41b40_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files\Morgan\Kaufmann.exe"C:\Program Files\Morgan\Kaufmann.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:908
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD54798fb559946ea09b86d7132dcb22b4b
SHA1a14d9b6c4c08d5d0f86f20b7b86b9fed8aa509a3
SHA2561d7d12770e57ba340d0958e05ff0c2ef6b60e90f509ffa5bc98ba3e1fe8f017e
SHA51240f540ae7d3f856e5665b4285b4a5e9b21cade0437ee61d7e014b56dcecab15fca79819616ae6a63e7371a7828f36da2b7d0621ccf1a653e22cccf273efcbd37