Analysis
-
max time kernel
94s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe
-
Size
8.5MB
-
MD5
c40657dbaa768159311c900040e87331
-
SHA1
28cc975a0f0e60cc150335aacf8de42bdccc6c10
-
SHA256
282661148dc431420779b56160af125bcc0f239fc4038e625134874a9b97cc38
-
SHA512
c0f0f24e060fb7579d7824d8e1501669d2d029c3386add4ae22c155ff22ec617ba7905708f84e677fc8e017ed4749395987037d8f5963eacb92777da49e12400
-
SSDEEP
98304:KmIeZ0xhRbMCNd+Fe5r9WNc7weFh3TMVBhQzh+hG1c7pyZCUpwhuJBAUZLl:pIeZOzNQSr9WQqhah+hGsyrpwhuJVZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4692 »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language »ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 5048 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5048 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 5048 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 5048 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5048 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 5048 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5048 wrote to memory of 4692 5048 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 84 PID 5048 wrote to memory of 4692 5048 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 84 PID 5048 wrote to memory of 4692 5048 2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_c40657dbaa768159311c900040e87331_hacktools_icedid.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\»ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exeC:\Users\Admin\AppData\Local\Temp\\»ðÈÞ°²È«Èí¼þÍÐÅ̳ÌÐò.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD575ec8484d197ebb85bc4751fc469d807
SHA18dd233dd3b476cdea5cc71d25dee77e86be4a682
SHA2563854dccf4b6d29be3f9ac9b76d584b39335ee8fd109ed21ae69e85be36d0d76f
SHA512a9190d3ad252a965aee60b855c421413a7c2d31f95640715364f827ba8eac285720580075ba9fe838407159dc197f4df6ba77007f8d63e8e204c1f3ad57e21c3