Analysis
-
max time kernel
120s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23/09/2023, 13:41
Behavioral task
behavioral1
Sample
2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe
-
Size
1.6MB
-
MD5
3cf38ce303732192fb8c32fc4b525e99
-
SHA1
e5dc8f65fddc6dec675107e9ec738dc14b989a0f
-
SHA256
8277a8faed72ed5660f749a46e332f270c6452decffeaaeceabe00d4476802ba
-
SHA512
4de6a4001c4891f05c8586cc1234f28f543c2b9bf9a0278583f8a7e14b3ebd54ff628dcf36cb79657a96b666f229eeaeab427b27ae6d4c32154c6ebc4af7048c
-
SSDEEP
24576:hBLfKPCdnYDZuWeFfUVXMlLMKRfmO+vzk5NOjY9jkgcvXdxzwcd2KPJt:hYinoeFfyX+LZR+mOjY6gcvnLjht
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/3012-15-0x00000000004E0000-0x000000000052E000-memory.dmp family_gh0strat behavioral1/memory/3012-16-0x0000000010000000-0x0000000010018000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 3012 Meumeu Nevne.exe 2592 Meumeu Nevne.exe -
Loads dropped DLL 4 IoCs
pid Process 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\getip = "C:\\Windows\\SysWOW64\\Meumeu Nevne.exe" Meumeu Nevne.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Meumeu Nevne.exe 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Meumeu Nevne.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Meumeu Nevne.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 3012 Meumeu Nevne.exe 3012 Meumeu Nevne.exe 2592 Meumeu Nevne.exe 2592 Meumeu Nevne.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3012 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 28 PID 2124 wrote to memory of 3012 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 28 PID 2124 wrote to memory of 3012 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 28 PID 2124 wrote to memory of 3012 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 28 PID 2124 wrote to memory of 2592 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 29 PID 2124 wrote to memory of 2592 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 29 PID 2124 wrote to memory of 2592 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 29 PID 2124 wrote to memory of 2592 2124 2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_3cf38ce303732192fb8c32fc4b525e99_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Meumeu Nevne.exe"C:\Windows\system32\\Meumeu Nevne.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
C:\Windows\SysWOW64\Meumeu Nevne.exe"C:\Windows\system32\\Meumeu Nevne.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD51259e3a3d449ceba068cb571209490cd
SHA13c31aa69b195a98bf10dce4f2f0e183a2c675c20
SHA2564592ae4068e49effb7200fe8488089f87b1ee1df871279c7fce0fd40f3c802f7
SHA5120475cc7affe74646b86cdd0848ffba4abce38327bbf6cf687112d412cf247e4904ac1c17aebc81a8ee305fb826fcf85d0bd24e86b0ee3ada95952b74551d72f9
-
Filesize
28KB
MD51259e3a3d449ceba068cb571209490cd
SHA13c31aa69b195a98bf10dce4f2f0e183a2c675c20
SHA2564592ae4068e49effb7200fe8488089f87b1ee1df871279c7fce0fd40f3c802f7
SHA5120475cc7affe74646b86cdd0848ffba4abce38327bbf6cf687112d412cf247e4904ac1c17aebc81a8ee305fb826fcf85d0bd24e86b0ee3ada95952b74551d72f9
-
Filesize
28KB
MD51259e3a3d449ceba068cb571209490cd
SHA13c31aa69b195a98bf10dce4f2f0e183a2c675c20
SHA2564592ae4068e49effb7200fe8488089f87b1ee1df871279c7fce0fd40f3c802f7
SHA5120475cc7affe74646b86cdd0848ffba4abce38327bbf6cf687112d412cf247e4904ac1c17aebc81a8ee305fb826fcf85d0bd24e86b0ee3ada95952b74551d72f9
-
Filesize
28KB
MD51259e3a3d449ceba068cb571209490cd
SHA13c31aa69b195a98bf10dce4f2f0e183a2c675c20
SHA2564592ae4068e49effb7200fe8488089f87b1ee1df871279c7fce0fd40f3c802f7
SHA5120475cc7affe74646b86cdd0848ffba4abce38327bbf6cf687112d412cf247e4904ac1c17aebc81a8ee305fb826fcf85d0bd24e86b0ee3ada95952b74551d72f9
-
Filesize
28KB
MD51259e3a3d449ceba068cb571209490cd
SHA13c31aa69b195a98bf10dce4f2f0e183a2c675c20
SHA2564592ae4068e49effb7200fe8488089f87b1ee1df871279c7fce0fd40f3c802f7
SHA5120475cc7affe74646b86cdd0848ffba4abce38327bbf6cf687112d412cf247e4904ac1c17aebc81a8ee305fb826fcf85d0bd24e86b0ee3ada95952b74551d72f9
-
Filesize
28KB
MD51259e3a3d449ceba068cb571209490cd
SHA13c31aa69b195a98bf10dce4f2f0e183a2c675c20
SHA2564592ae4068e49effb7200fe8488089f87b1ee1df871279c7fce0fd40f3c802f7
SHA5120475cc7affe74646b86cdd0848ffba4abce38327bbf6cf687112d412cf247e4904ac1c17aebc81a8ee305fb826fcf85d0bd24e86b0ee3ada95952b74551d72f9
-
Filesize
28KB
MD51259e3a3d449ceba068cb571209490cd
SHA13c31aa69b195a98bf10dce4f2f0e183a2c675c20
SHA2564592ae4068e49effb7200fe8488089f87b1ee1df871279c7fce0fd40f3c802f7
SHA5120475cc7affe74646b86cdd0848ffba4abce38327bbf6cf687112d412cf247e4904ac1c17aebc81a8ee305fb826fcf85d0bd24e86b0ee3ada95952b74551d72f9