Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe
-
Size
291KB
-
MD5
605cdbfeb2359c2fd6672af990a122a0
-
SHA1
620a5140bd0b5f077a11d1c9b0b78619d7b99745
-
SHA256
a552cabeed8a539e38ed4636f3d3407052775387740b688866aaf93722ae92ce
-
SHA512
501e52d881cc0ea706e0bdff756898999bbb439e3febd26774b08466310a92065980cf6ee5953d9ce51a51e04f4ba80bb1b972bb94401f67dd2cf73e75509fe1
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2868 .exe -
Loads dropped DLL 2 IoCs
pid Process 1656 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe 1656 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\.exe 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe File created C:\Program Files\.exe 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1656 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe 1656 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe 1656 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe 1656 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe 2868 .exe 2868 .exe 2868 .exe 2868 .exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2868 1656 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe 28 PID 1656 wrote to memory of 2868 1656 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe 28 PID 1656 wrote to memory of 2868 1656 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe 28 PID 1656 wrote to memory of 2868 1656 2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-12_605cdbfeb2359c2fd6672af990a122a0_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files\.exe"C:\Program Files\\.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD5a7d09bad209362ac87a785893c12e8ef
SHA19328e36954361339cbbe190cb23560497c011040
SHA2561a261473780c8d4e6fdb93439b0fef58e6d220a2daab87812bd01c211172ec39
SHA512124f52f67f733c66fe64cca24b178bd54da6f55e42fa199e040203caa428a0acd5b67820d2f3488dc802b595b2a16db6667e60e21ff79137a27de97a8e14baa1