Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe
-
Size
276KB
-
MD5
498d56e1ffa4bd5304f25da02ef7afd1
-
SHA1
bf65d357a30cd58c6710d5578a071086b616f76c
-
SHA256
68f5e079a663bf67f568ca7b973138d392ca6f875d8856d64efa46d4d84a8643
-
SHA512
054b8021f0caab5d553e72208ca23edf51525e2b2364e622948112b769e05201b94db3a3695017342a83f19d0ac5e26a49e5c602271de697d421472e49ce1115
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4912 approach.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\silently\approach.exe 2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe File opened for modification C:\Program Files\silently\approach.exe 2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 972 2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe 972 2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe 972 2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe 972 2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe 4912 approach.exe 4912 approach.exe 4912 approach.exe 4912 approach.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 972 wrote to memory of 4912 972 2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe 83 PID 972 wrote to memory of 4912 972 2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe 83 PID 972 wrote to memory of 4912 972 2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-02_498d56e1ffa4bd5304f25da02ef7afd1_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Program Files\silently\approach.exe"C:\Program Files\silently\approach.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4912
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD58b502c1d913ce3b26e202475ca0d97ae
SHA15e3ee24292879f8b15a9672870ad485b245943c7
SHA256e272929c4f3cdeff366975cb1a617629656bfa5a8107d41bd2a6d699004a7c29
SHA5126c9e29b48e920008421e406de6906b49200194379042cd1201e24474fe1443ca4de6eb94e3e482c203e63fa0c67888f037b56710bdcb1145a5c21e799a81c1e2