Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 01:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-10-13_2e27a6f83e05062f30ba121b6336ed8e_icedid.exe
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
2024-10-13_2e27a6f83e05062f30ba121b6336ed8e_icedid.exe
-
Size
908KB
-
MD5
2e27a6f83e05062f30ba121b6336ed8e
-
SHA1
8301a33a1c9a41ecf8f08073540353f7f8bb5feb
-
SHA256
bdcc905283c471bc144a8fe84f8514e299d5576f427464cb89cd419860b792df
-
SHA512
516082a41f45f9f855343ec8d65247d96b75c71b05b13ac5e6c26f6956fe917c3a82996456a1481e85013860f09a6d974a1aa43091129b5559993042fa35e056
-
SSDEEP
12288:qR6gYdcOUGtYa0cDyXkoCxaNHlofMmhR5nWFpPoSY2nXqOY:qR6ldqGtv0Uy0oOaJlofZ0bRa
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1872-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1872-50-0x0000000010000000-0x000000001003E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_2e27a6f83e05062f30ba121b6336ed8e_icedid.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1872 2024-10-13_2e27a6f83e05062f30ba121b6336ed8e_icedid.exe 1872 2024-10-13_2e27a6f83e05062f30ba121b6336ed8e_icedid.exe 1872 2024-10-13_2e27a6f83e05062f30ba121b6336ed8e_icedid.exe