Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe
-
Size
280KB
-
MD5
52f5af653a609b09e6e5278c1cf2e45b
-
SHA1
ab410368b59c8689d8f28155ae91f28a1993e1a6
-
SHA256
6d879b7c2096bbf702274d2c8f6ef629250f604d6c54b81d9029bed3aff7faf5
-
SHA512
a51dd6e70345cd884d0654ea4690e3d3e38b0762d7720ac919c130ebd513c6626c3d56a0c158f9fdfb2c56179b7d3f54da55cbbcd661dcccd05296c5b0c82b4d
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3048 Education.exe -
Loads dropped DLL 2 IoCs
pid Process 2424 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe 2424 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Inside\Education.exe 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe File opened for modification C:\Program Files\Inside\Education.exe 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2424 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe 2424 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe 2424 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe 2424 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe 3048 Education.exe 3048 Education.exe 3048 Education.exe 3048 Education.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3048 2424 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe 28 PID 2424 wrote to memory of 3048 2424 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe 28 PID 2424 wrote to memory of 3048 2424 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe 28 PID 2424 wrote to memory of 3048 2424 2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-04_52f5af653a609b09e6e5278c1cf2e45b_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Inside\Education.exe"C:\Program Files\Inside\Education.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5d62974985b369256bfb6d0cf91fc1862
SHA15ca5a6d7213f6562d743b3911894441603673b3c
SHA2562fcdac16cee572fbff11aa53a12632dd707c41cd1cce36ae454ee7baa77ca0e9
SHA512a09f340a9fc133b9c365a88f366d0d6fdcc72ef638f025fc6addb2fe9b8e853daec062d8308c5f3ffe09611b1770a3e43e34541058505f3f1e1c0d7249100d2a