Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe
-
Size
422KB
-
MD5
918299ec888e349dc7ace2a26571591b
-
SHA1
5b5d1565961e6d36ed27a31ad77795a4253096a4
-
SHA256
95610c959be00863b0c1a24b6c3287da2a9d40a3ea1c78e41bf1763a0b38e543
-
SHA512
6f7026cd0b422d5c332230535d133cccd91effe30c3777aa264dc14a1724acfc86738d27b95629b938101763e21ae71721e49a6ecb889b5db57bf7df597fb0e8
-
SSDEEP
12288:fplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:xxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2636 Reducing.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe 1688 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Naming\Reducing.exe 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1688 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe 1688 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe 1688 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe 1688 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe 2636 Reducing.exe 2636 Reducing.exe 2636 Reducing.exe 2636 Reducing.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2636 1688 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe 28 PID 1688 wrote to memory of 2636 1688 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe 28 PID 1688 wrote to memory of 2636 1688 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe 28 PID 1688 wrote to memory of 2636 1688 2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_918299ec888e349dc7ace2a26571591b_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files\Naming\Reducing.exe"C:\Program Files\Naming\Reducing.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD55cc1a30d4fd3dc5a3855790f3eb4c278
SHA18af3307fef71cff4c3cb6b07e41e93482b386d53
SHA2562f30d7526150b7fb9f34e97d09f88496031e2d793660d34cb681643881ced074
SHA5125451948c610c0b73f86d5ec34f7f4453b5bdefb66a5ff67fe8e0b2500c92f0e9aa7b23b63de61e078a353cad6c3249203b4fc6b3982a73216aeeee16c81b9500