Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe
-
Size
585KB
-
MD5
e457b9999f121c0312fda4d09ffa16c1
-
SHA1
e7d7e170546453ae7b72311de48b651b1f93b06e
-
SHA256
e8988fc3769d87d790979fe15e70ab0e4f0770a64552300181660a683c35e3fb
-
SHA512
bcb0cb37fea5de75c9faa4d7baf70988e4f2d8b4ba92f3c9edc6ab2f1f0def6544aa024442c29726221e58589a251a6064af1bfb4c39f20402f74eda561f1e60
-
SSDEEP
12288:mplrVbDdQaqdS/RfraFE/H8uB2Wm0SXsNr5FU:CxR1+FCcuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
locations.exepid process 4572 locations.exe -
Drops file in Program Files directory 1 IoCs
Processes:
2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exedescription ioc process File created C:\Program Files\structure\locations.exe 2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exelocations.exepid process 3692 2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe 3692 2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe 3692 2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe 3692 2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe 4572 locations.exe 4572 locations.exe 4572 locations.exe 4572 locations.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exedescription pid process target process PID 3692 wrote to memory of 4572 3692 2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe locations.exe PID 3692 wrote to memory of 4572 3692 2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe locations.exe PID 3692 wrote to memory of 4572 3692 2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe locations.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_e457b9999f121c0312fda4d09ffa16c1_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files\structure\locations.exe"C:\Program Files\structure\locations.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4572
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
585KB
MD5b709e2c4a436965458ea5722190a4f85
SHA164108d611b815c0332285b6d52d3a619e4e6eea0
SHA256c5e316db73a8d754a7f5f94cecc1c6e54e1b561ff8f797afc5b77044e4fb5ea1
SHA51216cf4cc9765727116bac1ef2eb25c980636ec37d655023d5558491b9499d92ffe0f8908129dc3b923cca6a104fb67a404043669a4a11b45c3cc3bc3a847e2d5d