Analysis
-
max time kernel
143s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe
-
Size
19.6MB
-
MD5
9505fabcc2fc161d2ba190bfda978997
-
SHA1
c04bd4f7d40a2959abd9d38232e6dc6dcdbebe99
-
SHA256
09215cdb5888215a4344ecae34af0598ce8f0d0ac21826c23b8a6c151b9b9d6c
-
SHA512
e3243161dee7445ee425da36f7857e721ca17a1a03dbc4d40ba4cc6125f8d57ec1c72dd89af94e8a977b82d8d4ef94aa021e5ccc4cca6436c17eb28a20ffd172
-
SSDEEP
98304:I70ODechpEDp5DMBMEzp27sSk5lfUTQNE8E/SyU6LkmJPSAxiILFFrbTA9//Xshi:oIL6p27sSku8EaWKAx3FFr6//Lx
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/972-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/972-50-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ΨѶ·þÎñÆ÷ÅúÁ¿Èº¿ØÈí¼þ[±»¿Ø¶Ë] = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe" 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3896 WMIC.exe Token: SeSecurityPrivilege 3896 WMIC.exe Token: SeTakeOwnershipPrivilege 3896 WMIC.exe Token: SeLoadDriverPrivilege 3896 WMIC.exe Token: SeSystemProfilePrivilege 3896 WMIC.exe Token: SeSystemtimePrivilege 3896 WMIC.exe Token: SeProfSingleProcessPrivilege 3896 WMIC.exe Token: SeIncBasePriorityPrivilege 3896 WMIC.exe Token: SeCreatePagefilePrivilege 3896 WMIC.exe Token: SeBackupPrivilege 3896 WMIC.exe Token: SeRestorePrivilege 3896 WMIC.exe Token: SeShutdownPrivilege 3896 WMIC.exe Token: SeDebugPrivilege 3896 WMIC.exe Token: SeSystemEnvironmentPrivilege 3896 WMIC.exe Token: SeRemoteShutdownPrivilege 3896 WMIC.exe Token: SeUndockPrivilege 3896 WMIC.exe Token: SeManageVolumePrivilege 3896 WMIC.exe Token: 33 3896 WMIC.exe Token: 34 3896 WMIC.exe Token: 35 3896 WMIC.exe Token: 36 3896 WMIC.exe Token: SeIncreaseQuotaPrivilege 3896 WMIC.exe Token: SeSecurityPrivilege 3896 WMIC.exe Token: SeTakeOwnershipPrivilege 3896 WMIC.exe Token: SeLoadDriverPrivilege 3896 WMIC.exe Token: SeSystemProfilePrivilege 3896 WMIC.exe Token: SeSystemtimePrivilege 3896 WMIC.exe Token: SeProfSingleProcessPrivilege 3896 WMIC.exe Token: SeIncBasePriorityPrivilege 3896 WMIC.exe Token: SeCreatePagefilePrivilege 3896 WMIC.exe Token: SeBackupPrivilege 3896 WMIC.exe Token: SeRestorePrivilege 3896 WMIC.exe Token: SeShutdownPrivilege 3896 WMIC.exe Token: SeDebugPrivilege 3896 WMIC.exe Token: SeSystemEnvironmentPrivilege 3896 WMIC.exe Token: SeRemoteShutdownPrivilege 3896 WMIC.exe Token: SeUndockPrivilege 3896 WMIC.exe Token: SeManageVolumePrivilege 3896 WMIC.exe Token: 33 3896 WMIC.exe Token: 34 3896 WMIC.exe Token: 35 3896 WMIC.exe Token: 36 3896 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 972 wrote to memory of 3544 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe 96 PID 972 wrote to memory of 3544 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe 96 PID 3544 wrote to memory of 3684 3544 cmd.exe 98 PID 3544 wrote to memory of 3684 3544 cmd.exe 98 PID 972 wrote to memory of 1808 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe 99 PID 972 wrote to memory of 1808 972 2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe 99 PID 1808 wrote to memory of 2484 1808 cmd.exe 101 PID 1808 wrote to memory of 2484 1808 cmd.exe 101 PID 2484 wrote to memory of 3896 2484 cmd.exe 102 PID 2484 wrote to memory of 3896 2484 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-09_9505fabcc2fc161d2ba190bfda978997_hijackloader_icedid_poet-rat.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\cmd.exe/c cmd /c nvidia-smi -q2⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\system32\cmd.execmd /c nvidia-smi -q3⤵PID:3684
-
-
-
C:\Windows\system32\cmd.exe/c cmd /c wmic logicaldisk where name='D:' get size,freespace2⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\cmd.execmd /c wmic logicaldisk where name='D:' get size,freespace3⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk where name='D:' get size,freespace4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
-