Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 09:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe
-
Size
1.4MB
-
MD5
9960ef7b4c63ebf352fcad7276e3c5fc
-
SHA1
18678d1a96dfd1ce0ff47c5cbad2a22667b7e42a
-
SHA256
0db102d31295df63a1f578a4772cf91a25b0a21b1156cd8faa5c2fb07f37bbfb
-
SHA512
46b4adfb97fa801dfbd9910243e234383154a6600317b0fb1f65e53deeef2609fc6afe47f4ccf2eaa7f3872436f47f794e8ed06e41cad5c0fbd1ecad7716c1f4
-
SSDEEP
24576:+Xs9a4wAZYv5UnDtG/lynVBwePIO9hmXCPAKOr36YU4CG73E:IEDtXURO9PAKOrBU4fbE
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\bingtang\leshireg.ini 2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe File opened for modification C:\Program Files\bingtang\leshireg.ini 2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2396 2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe 2396 2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe 2396 2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_9960ef7b4c63ebf352fcad7276e3c5fc_icedid.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2396