Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 19:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-09-14_7c36ad0bba30b6b6784dbd2bd8f5c57b_icedid.exe
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
2024-09-14_7c36ad0bba30b6b6784dbd2bd8f5c57b_icedid.exe
-
Size
10.2MB
-
MD5
7c36ad0bba30b6b6784dbd2bd8f5c57b
-
SHA1
b4d76d58fda1a694ba3d7880b81a20f7a768fa36
-
SHA256
022e065b175d313f536bf25ff114ada0454130f7cc20fd611d5e662aa2c2ad01
-
SHA512
81759d05dd2e9d2b8d8c831a154c9663b40a6e2322ea4d4696a99f0ad33de75ff7bfd29a3ed9348b0e0276aace009d52dd233f04af4e8e8e0041c169c323cd9d
-
SSDEEP
196608:81XYE0SCI4rbECIwBbiL4c7N5TndgoU0g18T0VIYaK+GutOHpDRw0nptlVOmp:OYn/8ChCzs184avnGutMpDDnpnVVp
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1952-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1952-0-0x0000000010000000-0x000000001003E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-14_7c36ad0bba30b6b6784dbd2bd8f5c57b_icedid.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1952 2024-09-14_7c36ad0bba30b6b6784dbd2bd8f5c57b_icedid.exe 1952 2024-09-14_7c36ad0bba30b6b6784dbd2bd8f5c57b_icedid.exe 1952 2024-09-14_7c36ad0bba30b6b6784dbd2bd8f5c57b_icedid.exe