Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe
-
Size
585KB
-
MD5
3613a9e500aabe298013427c4f0d5bce
-
SHA1
1d0ea75b860abcb44bb7f33a7551d922eff84cca
-
SHA256
c9d4b43ef20a05d1799e87092f4df81e3f5b5c55fe889a9ec4bd27c4ef2b009e
-
SHA512
f15d22d704eda3cbb42f82ef502c9af4dbcee748d5826f0609d0fb38bc812dc8787737412c65ea40dd764df51aecdd66b329d414ef3aca7e4bc380c0a9ba09ba
-
SSDEEP
12288:xplrVbDdQaqdS/RfraFE/H8uB2Wm0SXsNr5FU:DxR1+FCcuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Japanese.exepid process 2784 Japanese.exe -
Drops file in Program Files directory 1 IoCs
Processes:
2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exedescription ioc process File created C:\Program Files\Italian\Japanese.exe 2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exeJapanese.exepid process 1916 2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe 1916 2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe 1916 2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe 1916 2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe 2784 Japanese.exe 2784 Japanese.exe 2784 Japanese.exe 2784 Japanese.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exedescription pid process target process PID 1916 wrote to memory of 2784 1916 2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe Japanese.exe PID 1916 wrote to memory of 2784 1916 2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe Japanese.exe PID 1916 wrote to memory of 2784 1916 2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe Japanese.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_3613a9e500aabe298013427c4f0d5bce_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files\Italian\Japanese.exe"C:\Program Files\Italian\Japanese.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3852,i,1067197275908310731,12785105794523264014,262144 --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:81⤵PID:4768
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
585KB
MD51c89ae781e17f7e647acdbf8ac826d39
SHA1c9645c5d48b39200ce86f8f80f63e8f83c3e46c3
SHA25607cc47775245dfe7c547ebbdc4772a71d9dd7ca714a178990b5bef192069b889
SHA5128d45e3d543f013825317639f871068de2e3889ab14287f887790f775b8125db37b8f3f50c3ae815697dd10019ad681e5da094941dc47ab4818acc5a0815e6508