Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe
-
Size
422KB
-
MD5
66719dd227a2e037938f52582133c958
-
SHA1
a227c84d89a139b7b4fd0857c93787cda88c5254
-
SHA256
889ff1846263af33157e92173e6fda568e87f2d54443b3358c355e103e7b79b6
-
SHA512
9754c22fac9406ef02db78bf833ee82edb1e471c34d1c86e8d3fb4033aa08a4112d823ab52a64dc0834db832d497557fae5ca312cbf558f18ec6489b5db3499d
-
SSDEEP
12288:jplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:lxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2916 Follow.exe -
Loads dropped DLL 2 IoCs
pid Process 3056 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe 3056 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Dinstall\Follow.exe 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3056 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe 3056 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe 3056 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe 3056 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe 2916 Follow.exe 2916 Follow.exe 2916 Follow.exe 2916 Follow.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2916 3056 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe 28 PID 3056 wrote to memory of 2916 3056 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe 28 PID 3056 wrote to memory of 2916 3056 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe 28 PID 3056 wrote to memory of 2916 3056 2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_66719dd227a2e037938f52582133c958_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files\Dinstall\Follow.exe"C:\Program Files\Dinstall\Follow.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD5da7e8e5319ac89044a4cd65c94d49adc
SHA145dd86113234af5f81fbf4c085a81b6f6500dbfd
SHA256bb37109acdc839cd98075910581daca51322f6a75a0c601d438efda722fb95e2
SHA512e23bb8618f46abfb8482dcc3731d1d7ea5182041db73e1daa319ea26ffdd200d8cb4c9e4a92ad7612e699d8efec1ebf9385ede73078162d2cc379dd6eaf454c8