Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe
-
Size
276KB
-
MD5
2028be682c5facb54b7a895c63f63da3
-
SHA1
50fb086d445139a99d7931fe0df235b632ac442b
-
SHA256
e129280f165e539f639de10804102cc54f486d3b0c15cb9f64a2496f7be88df3
-
SHA512
670303a40919b32bc92c755811c276331bf77828dc693c8a4237d81a6b553bb60d6255a50fafe7e8f281f887a60d2173cb111e8e2688838268016eb683dde304
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 852 customizing.exe -
Loads dropped DLL 2 IoCs
pid Process 2308 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe 2308 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\callback\customizing.exe 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe File opened for modification C:\Program Files\callback\customizing.exe 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2308 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe 2308 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe 2308 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe 2308 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe 852 customizing.exe 852 customizing.exe 852 customizing.exe 852 customizing.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 852 2308 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe 28 PID 2308 wrote to memory of 852 2308 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe 28 PID 2308 wrote to memory of 852 2308 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe 28 PID 2308 wrote to memory of 852 2308 2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-23_2028be682c5facb54b7a895c63f63da3_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files\callback\customizing.exe"C:\Program Files\callback\customizing.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD59c4715c45c9c9d9cc6acf8cc51b9f79c
SHA1f2c465b2f299e40ef578ce7f9bed77a964139ff5
SHA2567301e639c89086692696a394ecf8845b9b17e8b74883cd80b3cfc29d6dd3e94d
SHA512f13f63eb2770fd682123d515a3b3be894440659446a84205055f2e4915b43c20f3e375cdb4afad5e251b087b53a5206ace53f58f0cd60e45361a08f3c9505adf