Analysis
-
max time kernel
134s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe
-
Size
587KB
-
MD5
e09b79b4193fa3f39ccc8d2660cb2e64
-
SHA1
c98429789cca20525fce0b3c7f15c781322aa545
-
SHA256
a681a9ace68e5fe63c6457f1a1fa6e82e178231faa3c948bd0b2e8eb9782d1ca
-
SHA512
9177499d3875ea0d524008a499715bb7b624783885aadb78d69b139b619ef92822b490b663d978a21d1998dd43dfea5311e817a5e01dd054c663d652650600d1
-
SSDEEP
12288:IplrVbDdQaqdS/RfraFE/H8uB2Wm0SXsNr5FU:0xR1+FCcuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Reference.exepid process 3496 Reference.exe -
Drops file in Program Files directory 1 IoCs
Processes:
2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exedescription ioc process File created C:\Program Files\facilitates\Reference.exe 2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exeReference.exepid process 3228 2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe 3228 2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe 3228 2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe 3228 2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe 3496 Reference.exe 3496 Reference.exe 3496 Reference.exe 3496 Reference.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exedescription pid process target process PID 3228 wrote to memory of 3496 3228 2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe Reference.exe PID 3228 wrote to memory of 3496 3228 2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe Reference.exe PID 3228 wrote to memory of 3496 3228 2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe Reference.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_e09b79b4193fa3f39ccc8d2660cb2e64_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Program Files\facilitates\Reference.exe"C:\Program Files\facilitates\Reference.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3496
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
587KB
MD568048983f7e87da48f3d4f7291efa8e4
SHA18a1173493f29ffa37f4e109cf02d3318b550d7b1
SHA256f2340488b3d2de7d9d7ea6044f3938df47442e890f44ebe7a62452962f30f55d
SHA512fd59bb391faa38c627e9d517518c23c1143efffaeeb5183a226281af78f112d9361a72f441d8d1328049b2e87ee97de0631b93c46298c547bd50232fb13c87ae