Analysis

  • max time kernel
    93s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 17:58

General

  • Target

    2024-04-15_d33e673fafefc233c63de9c2e44e4497_icedid.exe

  • Size

    430KB

  • MD5

    d33e673fafefc233c63de9c2e44e4497

  • SHA1

    5b3b1c99caf10f26c3c25de5764e9424b57e4ed8

  • SHA256

    cb4f6dfdec34c34ca4941a73418c3886a554c0c88e3a8c80c56174afd835b459

  • SHA512

    7bcd258e266ac95bb85b0aeafc4b449ca4bf1b4da71af78381dc0fc7f8c1a45f6bb654181f3a47ab626bd6a6949f0575328f9bc6426db3f6458b17f244134ecd

  • SSDEEP

    12288:pplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:rxRQ+Fucuvm0as

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-15_d33e673fafefc233c63de9c2e44e4497_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-15_d33e673fafefc233c63de9c2e44e4497_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3660
    • C:\Program Files\conforms\prototype.exe
      "C:\Program Files\conforms\prototype.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:668

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\conforms\prototype.exe

    Filesize

    430KB

    MD5

    805b7cd0d6b33b55693a769e489201db

    SHA1

    1e7e613e17036ab516bd3a63fb52014370c2ace3

    SHA256

    cac3084d40a1d32eb2594a76deedc6728dfb2dfd1571e74a8b78cab381507ef2

    SHA512

    09cc3b9a98e0fb2ec51ea0b65f898e9864f2376e0a93de743e07d69fe6d804f9cae03e70e646f98be23109592edf4275d20cfd594d0fdcf9b7f875d11ea1300b