Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe
-
Size
3.0MB
-
MD5
5206f49106fe46d3b93282dbe56e2158
-
SHA1
25e382f48b0db10b9118215fc764a05582701107
-
SHA256
5b1b894af745518bbf941eb5ae91f984415ef00afb8125c0b3f6495fbcdb772f
-
SHA512
ac1564ee10621700077ae9446e5dd5244aab29476a7932e6d7f6432318e20108e8658315cc1c00ee55d48d4e4e39928f0cd0b6816ad8866c85c8e447b9b3c321
-
SSDEEP
49152:yYREXSVMDi3CccmJ5DQd1jlmDvkRAuFkuoJZEtMFniQX4O8b8ITDnlQV:X2SVMD8CccmJ6d1Z4kRAuFkkmn
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023465-5.dat family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240621531.bat" look2.exe -
Executes dropped EXE 4 IoCs
pid Process 2504 look2.exe 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 920 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 3268 svchcst.exe -
Loads dropped DLL 3 IoCs
pid Process 2504 look2.exe 1396 svchost.exe 3268 svchcst.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\240621531.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language look2.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\ HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\ HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 2396 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2396 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 2396 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2504 2396 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 82 PID 2396 wrote to memory of 2504 2396 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 82 PID 2396 wrote to memory of 2504 2396 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 82 PID 2396 wrote to memory of 5036 2396 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 85 PID 2396 wrote to memory of 5036 2396 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 85 PID 2396 wrote to memory of 5036 2396 2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 85 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87 PID 5036 wrote to memory of 920 5036 HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exeC:\Users\Admin\AppData\Local\Temp\HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe"C:\Users\Admin\AppData\Local\Temp\HD_2024-09-07_5206f49106fe46d3b93282dbe56e2158_icedid.exe" --channel=5036.1.885768583 --type=renderer3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:920
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:1568
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1396 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240621531.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ca0c67ba7aeba6aed5ddb852e6eea811
SHA18b8db3434cac650ba795ff9aa8f89a24e4b83410
SHA2561c52b50019786ce77c3338f470a9193f90f71080196198357744cb065b7c6851
SHA512014fc45aa3141e160d5e78b963f065b196c7243ef0e630954de255b787d788f43f443b7a9a69c3b8b6f9e93e3f6ef25fe8ccfc7101fb196358b3459d4d6ec016
-
Filesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
Filesize
51KB
MD53da5e31294a31e4d8ccba89c745e08e6
SHA173ffee0ed6987c8f51a3368f64c1e5c56c8ff4a1
SHA25670d43fed2eadc8678f6ce549896dce16c27305de825f1b01ed4aad34eaebe82d
SHA5122f141699e16926273fc60eb69e3fe7bf291389e36ed3c9542a41e6b7e8ce2a48a5f24861104d7a41c3bf2a173f1b4afac6cebe2c0f670c2e43eacfcb93bf411d
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641