Analysis
-
max time kernel
111s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe
-
Size
264KB
-
MD5
20ed0fe6481d73411b7a8e37522d9565
-
SHA1
ea18be576ed4cea6935a07842c4d2f8f7ceb95cd
-
SHA256
5a80d7751a50f5a80ac6769e1a3330026739cdc226eb81825615d7aa8cca5026
-
SHA512
e14dee349bd67a9de9b71ccf0203222e5da0622ff178eb63d126b0019f4a10f317b136255e6caf78ac05c1f713729ab360ea5b25034433521804d5bfdbc8a20e
-
SSDEEP
3072:kxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:oU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 Tool.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe 1976 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Diagnostic\Tool.exe 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe File opened for modification C:\Program Files\Diagnostic\Tool.exe 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tool.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1976 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe 1976 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe 1976 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe 1976 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe 2904 Tool.exe 2904 Tool.exe 2904 Tool.exe 2904 Tool.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2904 1976 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe 29 PID 1976 wrote to memory of 2904 1976 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe 29 PID 1976 wrote to memory of 2904 1976 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe 29 PID 1976 wrote to memory of 2904 1976 2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-25_20ed0fe6481d73411b7a8e37522d9565_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Diagnostic\Tool.exe"C:\Program Files\Diagnostic\Tool.exe" "33201"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD537df088a06c12ee1752964e70549d184
SHA17b249b304fadde9542e1afd3dab3ce4a4d54abd9
SHA2561a3452d2eb580427abe56652e5b12455bf008047d1324d175d23b2c2353d4a33
SHA51214e37620036a34fd927d901373dd926e2cff23a7394d6bd1dd6ab344972985ba3fc56c6aa99346782f340043bcb0347e873c47fd72b3f7cd591c5bd670b72738