Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-25_59f7525059472a15083a15b703ab50ba_icedid.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-25_59f7525059472a15083a15b703ab50ba_icedid.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-25_59f7525059472a15083a15b703ab50ba_icedid.exe
-
Size
440KB
-
MD5
59f7525059472a15083a15b703ab50ba
-
SHA1
7749e0ff9ec5b9eb85555ab73db7566ff76f8431
-
SHA256
97a805db94669fbac36976216c5f99112706c45e8c7567b582ff7d75f27a784a
-
SHA512
48a641bbe9deae2b36370628b2896ab9146d887950cd971683980df96cf93c36a720c050d51062d43f30ecef1236e16f207d4298544c1dbee336caa14eb8c88f
-
SSDEEP
12288:JHhftsvpSfCludXukNtI0hslOYlTMLW9l4h19Tzk4:JHySxd+k/hWTl439T3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-25_59f7525059472a15083a15b703ab50ba_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 2024-07-25_59f7525059472a15083a15b703ab50ba_icedid.exe 2728 2024-07-25_59f7525059472a15083a15b703ab50ba_icedid.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD521d9924a4bddc5ca2866ea17955e533d
SHA1f53742812532c33c0747ecc26afb1b6dd0669f79
SHA2563d8f3719e5cc729a7ed4f5ac74ff5c5f15f79daa32a8a789526d35994bc04587
SHA512cc301c1538caa9bd4bffb3dd2ca78f664ba0e71012cd6ca642c3283acf604c6d180fef7b957d0d6cea7070ef333860bf17eefadcb1372fb7710dc0891bc29f35