Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe
Resource
win7-20240705-en
General
-
Target
2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe
-
Size
2.6MB
-
MD5
04c219134cffc77c39841c30704b2f6b
-
SHA1
1ac5a5b9a18575b0449745dd2d069f7a8b561d46
-
SHA256
6c59c6cfadff62b8d3b301d97e91b6a65b3da0415641fbabf95e3404c8e4fcbd
-
SHA512
58854e09a781150255d662a2a7968159b81a516dc05aa99a787da387b2baaba2c18e7187274e48b8cddb58aa920d7cdc4bdcab98a955f0a3bfd56fbc980b8361
-
SSDEEP
24576:0AKY7+JCMah2pE2Qd6fTmDCRiq2qRNQIB/1:0fYqUMahob/7mDCRV2iQI
Malware Config
Signatures
-
ParallaxRat payload 19 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/1232-4-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-8-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-9-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-11-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-23-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-22-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-21-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-20-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-19-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-18-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-17-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-16-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-15-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-14-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-13-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-12-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-10-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-24-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat behavioral2/memory/1232-31-0x0000000000400000-0x0000000000433000-memory.dmp parallax_rat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3456 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 1232 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 89 PID 3100 wrote to memory of 3456 3100 2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-08_04c219134cffc77c39841c30704b2f6b_icedid.exe"3⤵PID:1232
-
-