Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe
-
Size
585KB
-
MD5
c8914371fb5d7a746d1cddfd20ad94c2
-
SHA1
ecfa98112fc4b9929310bb8317cb7ebd257f9cf8
-
SHA256
9ff97d9e4a706a5753426f1174c6fc86988196806f7b587831ff449ac208f7e9
-
SHA512
987615f709954e3479399d09af97d19930922147a5da9284f139ad164e9012f9fa6046a81750250a4b127f4a721ed2195aac30661dcb1686f8d122352f1777bf
-
SSDEEP
12288:WplrVbDdQaqdS/RfraFE/H8uB2Wm0SXsNr5FU:yxR1+FCcuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2992 existing.exe -
Loads dropped DLL 2 IoCs
pid Process 2968 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe 2968 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\components\existing.exe 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2968 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe 2968 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe 2968 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe 2968 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe 2992 existing.exe 2992 existing.exe 2992 existing.exe 2992 existing.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2992 2968 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe 28 PID 2968 wrote to memory of 2992 2968 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe 28 PID 2968 wrote to memory of 2992 2968 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe 28 PID 2968 wrote to memory of 2992 2968 2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-29_c8914371fb5d7a746d1cddfd20ad94c2_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files\components\existing.exe"C:\Program Files\components\existing.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
585KB
MD5c2c2bdb3574e38a9e8de1226d7895355
SHA10ee10d2b343a8997254be08e5707b807e7f398b1
SHA25651c420feb2e33326d3fa1e0ea1d3ef59cc68f6ba604889394b6087bd429cc612
SHA512d9631f1d7c2929671dcc6ecdddbe2338c2c0f9dd6e7c4fb28a4e1dd0b4f4135fff94747c2272a53b8c5603ea1a40efaea2b52052944a69ab1bf2e6e835746b27