Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe
-
Size
586KB
-
MD5
fb1e6dc14fff28f08f44ab0548a33f0a
-
SHA1
4f723006ccf73b2fb7c317cf249eb0a6c9bef950
-
SHA256
58fdf72a17f4210de33dc3f545709580682a4fa33e8f17ca1eb5f875c09f0339
-
SHA512
ee9d4d8c473e848f3a7595f74b27edc06c6609a29ac0767fbe643c7e87d52bff5c5443a1deaf639ce978f7e1d20f3c28daf0b2e61292acc347d954af6a22d05f
-
SSDEEP
12288:iplrVbDdQaqdS/ofraFErH8uB2Wm0gXsNr5FU:uxRQ+Fucuvm0os
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Internals.exepid process 1228 Internals.exe -
Loads dropped DLL 2 IoCs
Processes:
2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exepid process 2276 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe 2276 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe -
Drops file in Program Files directory 1 IoCs
Processes:
2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exedescription ioc process File created C:\Program Files\Debugging\Internals.exe 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exeInternals.exepid process 2276 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe 2276 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe 2276 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe 2276 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe 1228 Internals.exe 1228 Internals.exe 1228 Internals.exe 1228 Internals.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exedescription pid process target process PID 2276 wrote to memory of 1228 2276 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe Internals.exe PID 2276 wrote to memory of 1228 2276 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe Internals.exe PID 2276 wrote to memory of 1228 2276 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe Internals.exe PID 2276 wrote to memory of 1228 2276 2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe Internals.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_fb1e6dc14fff28f08f44ab0548a33f0a_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files\Debugging\Internals.exe"C:\Program Files\Debugging\Internals.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
587KB
MD5082d5afc0f779270a4ca78e280280164
SHA1b8a9dd73076fc9bda80c447e71795dc6309a31db
SHA2563b901330935e8e5a22b127c60edea9b28496a57e479d02ac88a8ac1fd92d7cec
SHA51290df9b3573ac84e4e8e45a379737f680d16f95dc53e936d610baa0529da778fe48791f8cc68dd0f9d3510a6707d07936bfc91689bf7e68c362f2033ceaf4d3c5