Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe
-
Size
7.8MB
-
MD5
21881bd9939d7d09d3aaa549c14a2d08
-
SHA1
9ef8a14cb149b66c7b216b3ff0539d7e940aea27
-
SHA256
dcd7a485b2320a10c962d04ebc906948083f56f6296fd9806f945287636d0913
-
SHA512
55d5803c112a72a8e89aaade1f6f81f62a1e3e18e215861fdf01aac80636c4648907c14b88751569ac88e0a4718a19deaedcae4d730377ffe5bdd20fa89acf9d
-
SSDEEP
98304:G2SVMD8CoUF89ce+MgNW0Jqm9c29ky52/VhHqa3igtS4o1J8DvQxxE:Gcxcce+vNjJN9c29R5WVoaj44ooD4xxE
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259401925.bat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\259401925.bat" look2.exe -
Executes dropped EXE 3 IoCs
Processes:
look2.exeHD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exesvchcst.exepid process 2280 look2.exe 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2924 svchcst.exe -
Loads dropped DLL 6 IoCs
Processes:
2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exelook2.exesvchost.exesvchcst.exepid process 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2280 look2.exe 1572 svchost.exe 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 1572 svchost.exe 2924 svchcst.exe -
Drops file in System32 directory 4 IoCs
Processes:
look2.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\259401925.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Drops file in Program Files directory 1 IoCs
Processes:
2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exepid process 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exepid process 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exepid process 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exeHD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exepid process 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe 2572 HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exesvchost.exedescription pid process target process PID 2872 wrote to memory of 2280 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe look2.exe PID 2872 wrote to memory of 2280 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe look2.exe PID 2872 wrote to memory of 2280 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe look2.exe PID 2872 wrote to memory of 2280 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe look2.exe PID 2872 wrote to memory of 2572 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe PID 2872 wrote to memory of 2572 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe PID 2872 wrote to memory of 2572 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe PID 2872 wrote to memory of 2572 2872 2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe PID 1572 wrote to memory of 2924 1572 svchost.exe svchcst.exe PID 1572 wrote to memory of 2924 1572 svchost.exe svchcst.exe PID 1572 wrote to memory of 2924 1572 svchost.exe svchcst.exe PID 1572 wrote to memory of 2924 1572 svchost.exe svchcst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exeC:\Users\Admin\AppData\Local\Temp\HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2572
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:2564
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\259401925.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5559961b918d703e412b6dc026a2ad04f
SHA1087591775070c2947bbd0428f4db97fd07897fb1
SHA256f8cd9fb689fc87389dadfe1253e732362742950d80380f2888cfb1013f4b908f
SHA5124f0661c14fb58a30d52adcc2a5d6699ff1faed9dd336587617b1e04751a48f883485a4ef82b587b8c894225e01345020b004ed8bc7d33f15ef127dd9017eb286
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
6.6MB
MD525f201c6e8f6ab9b790f372059859ab8
SHA1c29b61ca2b8136746727b8090a1e544b3b1b1e36
SHA256f9d32c17af33e16ab220fb2fada62638624f0c495b10bff02db4496b0c4b1572
SHA5120bd3b937dc3b15c596d470235b220f28edde2d6e2963e3310e3be710a331eaf8b93741ca94aed18e57b7ece397645764c94f8e35e3bdc912eb9647f19e198c72
-
Filesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
Filesize
51KB
MD5b7b3c43064f9b7570100bcf91fe32243
SHA11ddac5c74d5f11ef655ad4b3657cced0476bceea
SHA2560ef9083ede4c183bbf7fca296b7854f539532e65b1e6daf85a735e4389d7f86b
SHA512ac659a07a6f93ba5af6d881baacece31b1585a39858a371c50961c8eb9b4ef492ce87cf9dc78d0c7081792e915fec8ebb884d04fe16d3e94c2693a7af78ebdbd