Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe
-
Size
587KB
-
MD5
8078c831214b5f3361c9c61fbddf4fcd
-
SHA1
8f88ca4991307c5d6cc239e2112fc76a6ba6aafe
-
SHA256
978832106c049f2617e18e31e407560f538985d24c6cadef5bd61aba39f4e631
-
SHA512
929889c6e045689c2527fbe276ba54e41ffd6bec99076a3c8714a18af99c0db9df244b8bd8b1ee5c7244841d175a16d8cf38e8873610fc507157f6eafb6f20d3
-
SSDEEP
12288:KplrVbDdQaqdS/ofraFErH8uB2Wm0gXsNr5FU:mxRQ+Fucuvm0os
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2432 silent.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe 1688 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\option\silent.exe 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1688 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe 1688 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe 1688 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe 1688 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe 2432 silent.exe 2432 silent.exe 2432 silent.exe 2432 silent.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2432 1688 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe 28 PID 1688 wrote to memory of 2432 1688 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe 28 PID 1688 wrote to memory of 2432 1688 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe 28 PID 1688 wrote to memory of 2432 1688 2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-27_8078c831214b5f3361c9c61fbddf4fcd_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files\option\silent.exe"C:\Program Files\option\silent.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
587KB
MD50c063279e633b97820ccae4c1269aa3b
SHA1ddd71cd9a5bb99865a43df5a00d68f036f159f4d
SHA256bc9d4b605b3a2e95a58462484a5ae04ef8209704cacdda544a236e207ff52176
SHA51205c1a21898c5602eff26087438ac25727b6c6b57c1e8dd2ebfe4e0a3de2bfb3b663064f7c9edda589fb4dfb10e651e7c93a37c56067c5ba6936fbbfe0ed97ba2