Analysis
-
max time kernel
129s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 06:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-13_7767ab6b0e3ea41896cd497907dd409c_icedid.exe
Resource
win7-20240508-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-13_7767ab6b0e3ea41896cd497907dd409c_icedid.exe
Resource
win10v2004-20240426-en
2 signatures
150 seconds
General
-
Target
2024-05-13_7767ab6b0e3ea41896cd497907dd409c_icedid.exe
-
Size
2.3MB
-
MD5
7767ab6b0e3ea41896cd497907dd409c
-
SHA1
7a53e06afb0ec0a219da9eb206ce6a8a3fca36c5
-
SHA256
4ddecca1f9a0d6ce9c99d48adfa661f1b4e091ad8b630e33cb9cc87d1da8187e
-
SHA512
6a18ceb6b369ddc808fb6d06d280130b9c64c57ac30e691022b69a22e0ff610bccc3b954820f9d3d159530579bfab9434bae3b74fd21c45b58e529d3a1cc77eb
-
SSDEEP
49152:ix4X6xd8/dFyduUOsQDxDJdoeoahDhaTW3siRLTVu4pyG/dRVR:jOd8/dFZUOJxDJdoeoahDhaTYppu4pyU
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1472 2024-05-13_7767ab6b0e3ea41896cd497907dd409c_icedid.exe 1472 2024-05-13_7767ab6b0e3ea41896cd497907dd409c_icedid.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1472 wrote to memory of 4328 1472 2024-05-13_7767ab6b0e3ea41896cd497907dd409c_icedid.exe 83 PID 1472 wrote to memory of 4328 1472 2024-05-13_7767ab6b0e3ea41896cd497907dd409c_icedid.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-13_7767ab6b0e3ea41896cd497907dd409c_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-13_7767ab6b0e3ea41896cd497907dd409c_icedid.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1372