Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe
-
Size
289KB
-
MD5
fefe9118ac096b5300fbf413ebd47ce2
-
SHA1
5c290118ebea9124b6bb0538860d97649060f294
-
SHA256
0796bc3b492e5ae388f842b73dfc36a68c0b482d4347cf0448db13f91e6bedbb
-
SHA512
00af6bf8ee84179fedac27e3cd89c2821460afddf8236de93e65f9ec33c347ef8baa48cfd0092ab84b3b9bb829e0279c5b5c7e09bb9f56c723432b04cf6c0b2e
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
match.exepid process 2092 match.exe -
Loads dropped DLL 2 IoCs
Processes:
2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exepid process 3012 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe 3012 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe -
Drops file in Program Files directory 2 IoCs
Processes:
2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exedescription ioc process File created C:\Program Files\build\match.exe 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe File opened for modification C:\Program Files\build\match.exe 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exematch.exepid process 3012 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe 3012 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe 3012 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe 3012 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe 2092 match.exe 2092 match.exe 2092 match.exe 2092 match.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exedescription pid process target process PID 3012 wrote to memory of 2092 3012 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe match.exe PID 3012 wrote to memory of 2092 3012 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe match.exe PID 3012 wrote to memory of 2092 3012 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe match.exe PID 3012 wrote to memory of 2092 3012 2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe match.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_fefe9118ac096b5300fbf413ebd47ce2_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files\build\match.exe"C:\Program Files\build\match.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2092
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289KB
MD5175829962ce70ea95a7792c769a3ee8c
SHA170bfd71d98587dd36200eaea79f1d0382ad5f4c5
SHA2566d1f7a02431c5138b9b4ef7bdf18c8e0f6b16704891f72225c45958220cb4fb5
SHA5129674cd35b4e132a0bb78e181672992f40c625060d0b68099c371bc1d8f7eae796fe1d30144efe1dadc3eb6c3c419c9d54e25a654327415ad5c19beca532df28c