Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe
-
Size
278KB
-
MD5
cee0180641f60fd40a251ef275b2a9d3
-
SHA1
7820b0140a5b397c0c2cc760a22e4a0d6ad91ce9
-
SHA256
8daa056ca7735bb80e55d1a361295a52619ff62d15e0279d76f12de81bb01607
-
SHA512
828531a173b8be26fccf86f656b6c6274b7b7ab40d5b737a40efb9d693bd079fad07fe46bea40d8de58060f8486244c84d020527cc06dbc66236779992f93280
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3552 obtains.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\provided\obtains.exe 2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe File opened for modification C:\Program Files\provided\obtains.exe 2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1996 2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe 1996 2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe 1996 2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe 1996 2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe 3552 obtains.exe 3552 obtains.exe 3552 obtains.exe 3552 obtains.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3552 1996 2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe 81 PID 1996 wrote to memory of 3552 1996 2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe 81 PID 1996 wrote to memory of 3552 1996 2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-27_cee0180641f60fd40a251ef275b2a9d3_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\provided\obtains.exe"C:\Program Files\provided\obtains.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3552
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278KB
MD5666ed150aafe83b4f32d2a1ce5a77f0c
SHA1a801419ef91bd1a8b887c2ccbdecc9d8d7afa5f7
SHA25661b0fb874e930fbc2c48e3f80bc0919b04f0dd76c54498924191c008a14c4648
SHA51248dbfc639be7546c46138b306d71f5e9deaf6707b9b40c7f075b82c91450389291c432e535a2a1cbd983165f529aabced1f69e1c282cf87368aba38395a279f5