Analysis
-
max time kernel
88s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe
-
Size
265KB
-
MD5
5aa58a109d9221c395e6ec434f49b2dd
-
SHA1
9ed4ee73bfb60ee7b02bb6929eb92583cfd10dde
-
SHA256
f790800b3fd43c2825c54ff66565492d11b78a90cb944d75cc8175425e27c6e6
-
SHA512
85dd591ebff1c14a578fe2e8af01bd6a7305d40d1d05bf5e80d8307b111c9688734139a00a822addf268e9db207e222b52b6976e0957f9439c2bfd840540d283
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 prototype.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\conforms\prototype.exe 2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe File opened for modification C:\Program Files\conforms\prototype.exe 2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4220 2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe 4220 2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe 4220 2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe 4220 2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe 2788 prototype.exe 2788 prototype.exe 2788 prototype.exe 2788 prototype.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4220 wrote to memory of 2788 4220 2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe 86 PID 4220 wrote to memory of 2788 4220 2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe 86 PID 4220 wrote to memory of 2788 4220 2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-11_5aa58a109d9221c395e6ec434f49b2dd_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files\conforms\prototype.exe"C:\Program Files\conforms\prototype.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD516584cd53e875660eadd25b7afb04096
SHA1370e154d5082a2f8d19976da9703095b49e2a63b
SHA2563daf67461ce39c46ce0ad35f7cfc216a04afe735caec7c0d541054a0e9bc5875
SHA51212168021f80ebfd57ecbadd88f238c8ba1a42b4c4fe4407b57cfef11f99d6e52e969520ae46156031b09d7c81819a76d20d538004e410591be83bb2b3e5b3c1f