Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2023 10:55
Static task
static1
Behavioral task
behavioral1
Sample
6b771c004988c47e1a8e6d668a5fad2b_hacktools_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6b771c004988c47e1a8e6d668a5fad2b_hacktools_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6b771c004988c47e1a8e6d668a5fad2b_hacktools_icedid_JC.exe
-
Size
2.5MB
-
MD5
6b771c004988c47e1a8e6d668a5fad2b
-
SHA1
03f2f3c2eb0c454fc8021a431469c1a695b8adca
-
SHA256
2bd417420f1e8bfe093b494d564e75ade5e9c65d26219e12bcd999a3174d58a2
-
SHA512
84728c987b1c5b7facb464976e8816dfb56b35b2e5332d67db3c780ac17f71b4ab412d7f02ae95ad6319016ff4827515d7131005cb2933ff75e74b0e50b9732c
-
SSDEEP
49152:XmvdgqxpQzgXQ3TooLeYN/yKiZ3pWBST1W5KiZn:IZpQzgXgkoLpN/yKO8OW5KOn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 784 LTKE.JHHAQ -
Loads dropped DLL 4 IoCs
pid Process 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ESPI11.dll LTKE.JHHAQ File created C:\Windows\SysWOW64\fuzhu.dll LTKE.JHHAQ File created C:\Windows\SysWOW64\shurufa.ime LTKE.JHHAQ File created C:\Windows\SysWOW64\ESPI11.dll LTKE.JHHAQ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ 784 LTKE.JHHAQ -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2076 6b771c004988c47e1a8e6d668a5fad2b_hacktools_icedid_JC.exe 2076 6b771c004988c47e1a8e6d668a5fad2b_hacktools_icedid_JC.exe 784 LTKE.JHHAQ 784 LTKE.JHHAQ -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2076 wrote to memory of 784 2076 6b771c004988c47e1a8e6d668a5fad2b_hacktools_icedid_JC.exe 80 PID 2076 wrote to memory of 784 2076 6b771c004988c47e1a8e6d668a5fad2b_hacktools_icedid_JC.exe 80 PID 2076 wrote to memory of 784 2076 6b771c004988c47e1a8e6d668a5fad2b_hacktools_icedid_JC.exe 80 PID 784 wrote to memory of 4108 784 LTKE.JHHAQ 84 PID 784 wrote to memory of 4108 784 LTKE.JHHAQ 84 PID 784 wrote to memory of 4108 784 LTKE.JHHAQ 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b771c004988c47e1a8e6d668a5fad2b_hacktools_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\6b771c004988c47e1a8e6d668a5fad2b_hacktools_icedid_JC.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\LTKE.JHHAQ"C:\Users\Admin\AppData\Local\Temp\LTKE.JHHAQ"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\netsh.exenetsh winsock reset3⤵PID:4108
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5c3adbb35a05b44bc877a895d273aa270
SHA18afe20d8261d217fd23ccfe53bd45ad3bec82d2d
SHA256b2b2ea9737587313d420bde96a42063c002a83e35d9f987f8ec0d5d4d96c262c
SHA512614dc24e3368047d68e2833ecdf9cda1f5ef290fc74287769a70df46bfa937386ce2e1332b3bada0f7e54b470ecdfe7c8bbd4ec3fa1c815f52993bb7edb93afc
-
Filesize
120KB
MD5c3adbb35a05b44bc877a895d273aa270
SHA18afe20d8261d217fd23ccfe53bd45ad3bec82d2d
SHA256b2b2ea9737587313d420bde96a42063c002a83e35d9f987f8ec0d5d4d96c262c
SHA512614dc24e3368047d68e2833ecdf9cda1f5ef290fc74287769a70df46bfa937386ce2e1332b3bada0f7e54b470ecdfe7c8bbd4ec3fa1c815f52993bb7edb93afc
-
Filesize
2.5MB
MD5ebcba278b31d961267f457c6c19e9a82
SHA1de9d02119bdf226f3afe1956077dfb2c43d3cc34
SHA2569235b6b24f8449b7481358c61af6d7792e60d4ace7db97b22dfc0b4de1b080d3
SHA512f929fb7b6cbcd31d32b231ca8d35ce539e6ec9d643dd55a0106afa0ea4c4372a5fdef02ae1aec88e93d2ac6c3b6c8b4f3387bc4d85d801c6ed9495de2ebd60b4
-
Filesize
2.5MB
MD5ebcba278b31d961267f457c6c19e9a82
SHA1de9d02119bdf226f3afe1956077dfb2c43d3cc34
SHA2569235b6b24f8449b7481358c61af6d7792e60d4ace7db97b22dfc0b4de1b080d3
SHA512f929fb7b6cbcd31d32b231ca8d35ce539e6ec9d643dd55a0106afa0ea4c4372a5fdef02ae1aec88e93d2ac6c3b6c8b4f3387bc4d85d801c6ed9495de2ebd60b4
-
Filesize
120KB
MD5c3adbb35a05b44bc877a895d273aa270
SHA18afe20d8261d217fd23ccfe53bd45ad3bec82d2d
SHA256b2b2ea9737587313d420bde96a42063c002a83e35d9f987f8ec0d5d4d96c262c
SHA512614dc24e3368047d68e2833ecdf9cda1f5ef290fc74287769a70df46bfa937386ce2e1332b3bada0f7e54b470ecdfe7c8bbd4ec3fa1c815f52993bb7edb93afc
-
Filesize
52KB
MD5b60da4e2e5aceba3ce3d87ee2cd872ee
SHA19bbdbf1f3ce2c000a86e0473da756a4b1031db41
SHA256b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453
SHA512664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874
-
Filesize
52KB
MD5b60da4e2e5aceba3ce3d87ee2cd872ee
SHA19bbdbf1f3ce2c000a86e0473da756a4b1031db41
SHA256b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453
SHA512664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874
-
Filesize
52KB
MD5b60da4e2e5aceba3ce3d87ee2cd872ee
SHA19bbdbf1f3ce2c000a86e0473da756a4b1031db41
SHA256b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453
SHA512664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874