Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 05:21

General

  • Target

    2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe

  • Size

    8.5MB

  • MD5

    c40657dbaa768159311c900040e87331

  • SHA1

    28cc975a0f0e60cc150335aacf8de42bdccc6c10

  • SHA256

    282661148dc431420779b56160af125bcc0f239fc4038e625134874a9b97cc38

  • SHA512

    c0f0f24e060fb7579d7824d8e1501669d2d029c3386add4ae22c155ff22ec617ba7905708f84e677fc8e017ed4749395987037d8f5963eacb92777da49e12400

  • SSDEEP

    98304:KmIeZ0xhRbMCNd+Fe5r9WNc7weFh3TMVBhQzh+hG1c7pyZCUpwhuJBAUZLl:pIeZOzNQSr9WQqhah+hGsyrpwhuJVZ

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 42 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\»ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe
      C:\Users\Admin\AppData\Local\Temp\\»ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:1352
  • C:\Program Files (x86)\Microsoft Qyuuis\»ðÈÞ°²È«Èí¼þ.bat
    "C:\Program Files (x86)\Microsoft Qyuuis\»ðÈÞ°²È«Èí¼þ.bat"
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:7996
    • C:\Program Files (x86)\Microsoft Qyuuis\»ðÈÞ°²È«Èí¼þ.bat
      "C:\Program Files (x86)\Microsoft Qyuuis\»ðÈÞ°²È«Èí¼þ.bat" Win7
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      PID:13792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\»ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe

    Filesize

    900KB

    MD5

    75ec8484d197ebb85bc4751fc469d807

    SHA1

    8dd233dd3b476cdea5cc71d25dee77e86be4a682

    SHA256

    3854dccf4b6d29be3f9ac9b76d584b39335ee8fd109ed21ae69e85be36d0d76f

    SHA512

    a9190d3ad252a965aee60b855c421413a7c2d31f95640715364f827ba8eac285720580075ba9fe838407159dc197f4df6ba77007f8d63e8e204c1f3ad57e21c3

  • memory/1352-547-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-521-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-25398-0x0000000000400000-0x000000000053A000-memory.dmp

    Filesize

    1.2MB

  • memory/1352-543-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-14-0x0000000000400000-0x000000000053A000-memory.dmp

    Filesize

    1.2MB

  • memory/1352-541-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-510-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-15-0x0000000076840000-0x0000000076887000-memory.dmp

    Filesize

    284KB

  • memory/1352-545-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-567-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-571-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-2916-0x0000000001FF0000-0x0000000002171000-memory.dmp

    Filesize

    1.5MB

  • memory/1352-565-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-563-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-561-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-559-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-557-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-539-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-553-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-551-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-549-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-511-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-513-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-515-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-555-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-537-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-535-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-569-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-533-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-531-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-529-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-527-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-525-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-523-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-517-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/1352-519-0x00000000022A0000-0x00000000023B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2904-2-0x0000000000D80000-0x0000000000D81000-memory.dmp

    Filesize

    4KB

  • memory/2904-3-0x0000000000D70000-0x0000000000D71000-memory.dmp

    Filesize

    4KB

  • memory/2904-0-0x0000000000D60000-0x0000000000D61000-memory.dmp

    Filesize

    4KB

  • memory/2904-11-0x0000000003F10000-0x000000000404A000-memory.dmp

    Filesize

    1.2MB

  • memory/2904-12-0x0000000003F10000-0x000000000404A000-memory.dmp

    Filesize

    1.2MB

  • memory/2904-1-0x0000000000D10000-0x0000000000D11000-memory.dmp

    Filesize

    4KB

  • memory/7996-7997-0x0000000000400000-0x000000000053A000-memory.dmp

    Filesize

    1.2MB

  • memory/7996-16695-0x0000000000400000-0x000000000053A000-memory.dmp

    Filesize

    1.2MB

  • memory/13792-25391-0x0000000000400000-0x000000000053A000-memory.dmp

    Filesize

    1.2MB