Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe
-
Size
586KB
-
MD5
95b63cd1e9c458ee25b2a5788cf152ae
-
SHA1
b910d0ed8fce96274214ec96b46b49db89272a7e
-
SHA256
d6a960bd7b30f96075dc498f3f1da3f3817046b1f7c83f6dde5fca09657cc437
-
SHA512
d52e3060903486a69196bfd234fbabf9bb2d2fba469f380d11be19d34f11f92216afd39c1bdd905fce4a6618cc69558da370b9683fd66b30373bb9d8c0e04c39
-
SSDEEP
12288:2plrVbDdQaqdS/RfraFE/H8uB2Wm0SXsNr5FU:SxR1+FCcuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
GetDXVer.exepid process 2228 GetDXVer.exe -
Loads dropped DLL 2 IoCs
Processes:
2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exepid process 1760 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe 1760 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe -
Drops file in Program Files directory 1 IoCs
Processes:
2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exedescription ioc process File created C:\Program Files\Tool\GetDXVer.exe 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exeGetDXVer.exepid process 1760 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe 1760 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe 1760 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe 1760 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe 2228 GetDXVer.exe 2228 GetDXVer.exe 2228 GetDXVer.exe 2228 GetDXVer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exedescription pid process target process PID 1760 wrote to memory of 2228 1760 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe GetDXVer.exe PID 1760 wrote to memory of 2228 1760 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe GetDXVer.exe PID 1760 wrote to memory of 2228 1760 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe GetDXVer.exe PID 1760 wrote to memory of 2228 1760 2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe GetDXVer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_95b63cd1e9c458ee25b2a5788cf152ae_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files\Tool\GetDXVer.exe"C:\Program Files\Tool\GetDXVer.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2228
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
586KB
MD55a286877f8a4ff36d006dfcf45d9cdaa
SHA1c6d193b14990cd0eb9166150463621087866befd
SHA2560cd41316d0aff6ed352f4b9626f604a0c2509ccc41571f52bf70305c54cc6c61
SHA51283bfce7c8d0a47f833b28e588451dc3b53e6b03c1b4e968804742e8a5ce56c0b1aa9b0c4690e77bf2966a0cfa5a664235814bc8c9b4cbc6175859bc27c565e89