Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe
-
Size
396KB
-
MD5
3e2e5e68ba2ce4c2d231314d972831e8
-
SHA1
df4513a236a2d89fbdcdd4051cb4b5e3d28e593f
-
SHA256
646adeefa2ecde777c565b8c41ae51befea3d54fc1d00173f7340c3590509c96
-
SHA512
ad2bc858f8d76d889d746f7e23180ae1aa9a19a9d5c3e2f476146df3fb116d321dc8b65eee2c2ba49b8f16871d7cb0c6f56014ae4a206d0a2d3285fa10d69508
-
SSDEEP
12288:oplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:UxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1988 development.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe 2096 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\approach\development.exe 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2096 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe 2096 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe 2096 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe 2096 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe 1988 development.exe 1988 development.exe 1988 development.exe 1988 development.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1988 2096 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe 28 PID 2096 wrote to memory of 1988 2096 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe 28 PID 2096 wrote to memory of 1988 2096 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe 28 PID 2096 wrote to memory of 1988 2096 2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-21_3e2e5e68ba2ce4c2d231314d972831e8_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\approach\development.exe"C:\Program Files\approach\development.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5126a882915008f4b32b7c8765fe3a410
SHA15fc12772a0396a03bf19d829c73e4dd4c9bc796c
SHA256b8494dea33d3a2470d59b05dcceaf65eb443d105b96efb625210c1ea461c2c6e
SHA5128cab8a09ab9f1a7b8875cb9817e4a7784c5941e0383155f99af06172552c11b2bf3aadab2d15253d06eeb9f8d994442c8be73ed930efb817aea5eed83ab301d2