Analysis

  • max time kernel
    144s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2024 00:35

General

  • Target

    2024-04-23_705e3ea1c55cb3daea517338f770bf02_icedid.exe

  • Size

    421KB

  • MD5

    705e3ea1c55cb3daea517338f770bf02

  • SHA1

    6388f39669b734ac9031a85d1ef149e140ac6a28

  • SHA256

    efe6a5f9cde30a997bcbe3222400ccf91f5b8ffbcaddff1bce7f119a484b9c5f

  • SHA512

    9335618fc596927cbf4f74f67946de49c8f981dc7d8061eeaea1bc858442fd9ab70e621af114b50870e2d90fcab676bd6f7122893128c4d12c96731bb1466847

  • SSDEEP

    12288:EplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:AxRQ+Fucuvm0a/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-23_705e3ea1c55cb3daea517338f770bf02_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-23_705e3ea1c55cb3daea517338f770bf02_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3688
    • C:\Program Files\command\perating.exe
      "C:\Program Files\command\perating.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\command\perating.exe

    Filesize

    421KB

    MD5

    6ae78d9c5f9376e5e2aeb2147c2c8c1c

    SHA1

    6281cf8ca2e1c318ef0d5be02ab88c60fe890041

    SHA256

    5c26c94490e6c76ae4d414087ee59785e937f111768ca2af7da0384fb4fec8dc

    SHA512

    90f633297489476b0e8c9b723c7b372a52c8e1bdee38d9816787211162d4fa861102b2687f4165d2b2255370da4e71ef3d41ecfe561e8767560b30ec2255df90

  • memory/3688-0-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/3688-5-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/4952-6-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB

  • memory/4952-7-0x0000000000400000-0x0000000000573000-memory.dmp

    Filesize

    1.4MB