Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe
-
Size
8.5MB
-
MD5
c40657dbaa768159311c900040e87331
-
SHA1
28cc975a0f0e60cc150335aacf8de42bdccc6c10
-
SHA256
282661148dc431420779b56160af125bcc0f239fc4038e625134874a9b97cc38
-
SHA512
c0f0f24e060fb7579d7824d8e1501669d2d029c3386add4ae22c155ff22ec617ba7905708f84e677fc8e017ed4749395987037d8f5963eacb92777da49e12400
-
SSDEEP
98304:KmIeZ0xhRbMCNd+Fe5r9WNc7weFh3TMVBhQzh+hG1c7pyZCUpwhuJBAUZLl:pIeZOzNQSr9WQqhah+hGsyrpwhuJVZ
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/7996-16695-0x0000000000400000-0x000000000053A000-memory.dmp family_gh0strat behavioral1/memory/13792-25391-0x0000000000400000-0x000000000053A000-memory.dmp family_gh0strat behavioral1/memory/1352-25398-0x0000000000400000-0x000000000053A000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 7996 »ðÈÞ°²È«Èí¼þ.bat 13792 »ðÈÞ°²È«Èí¼þ.bat -
Loads dropped DLL 2 IoCs
pid Process 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 42 IoCs
pid Process 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 7996 »ðÈÞ°²È«Èí¼þ.bat 7996 »ðÈÞ°²È«Èí¼þ.bat 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 13792 »ðÈÞ°²È«Èí¼þ.bat 13792 »ðÈÞ°²È«Èí¼þ.bat 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 13792 »ðÈÞ°²È«Èí¼þ.bat 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe 1352 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Qyuuis\»ðÈÞ°²È«Èí¼þ.bat »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe File opened for modification C:\Program Files (x86)\Microsoft Qyuuis\»ðÈÞ°²È«Èí¼þ.bat »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language »ðÈÞ°²È«Èí¼þ.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language »ðÈÞ°²È«Èí¼þ.bat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2904 wrote to memory of 1352 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 29 PID 2904 wrote to memory of 1352 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 29 PID 2904 wrote to memory of 1352 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 29 PID 2904 wrote to memory of 1352 2904 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 29 PID 7996 wrote to memory of 13792 7996 »ðÈÞ°²È«Èí¼þ.bat 31 PID 7996 wrote to memory of 13792 7996 »ðÈÞ°²È«Èí¼þ.bat 31 PID 7996 wrote to memory of 13792 7996 »ðÈÞ°²È«Èí¼þ.bat 31 PID 7996 wrote to memory of 13792 7996 »ðÈÞ°²È«Èí¼þ.bat 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\»ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exeC:\Users\Admin\AppData\Local\Temp\\»ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1352
-
-
C:\Program Files (x86)\Microsoft Qyuuis\»ðÈÞ°²È«Èí¼þ.bat"C:\Program Files (x86)\Microsoft Qyuuis\»ðÈÞ°²È«Èí¼þ.bat"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:7996 -
C:\Program Files (x86)\Microsoft Qyuuis\»ðÈÞ°²È«Èí¼þ.bat"C:\Program Files (x86)\Microsoft Qyuuis\»ðÈÞ°²È«Èí¼þ.bat" Win72⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:13792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD575ec8484d197ebb85bc4751fc469d807
SHA18dd233dd3b476cdea5cc71d25dee77e86be4a682
SHA2563854dccf4b6d29be3f9ac9b76d584b39335ee8fd109ed21ae69e85be36d0d76f
SHA512a9190d3ad252a965aee60b855c421413a7c2d31f95640715364f827ba8eac285720580075ba9fe838407159dc197f4df6ba77007f8d63e8e204c1f3ad57e21c3