Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe
-
Size
1.1MB
-
MD5
7c26033e3697a3d4d4165b588a9386b9
-
SHA1
e139ce553f65be96896091c82b06dcd1a4a4e819
-
SHA256
5e90f35240e338671325da8a1c91061daef1dff12b07d6c1d778ac52ae0ff510
-
SHA512
046f17f8d5cb285393420af2f9406601b8b6461c6fc3c1dc1b4e678d1782786e61c7dba14e9ef6adc42de856be434be835c08fda62b6e3bbac1c914831ed0429
-
SSDEEP
24576:5bGl7H7tm3oZTQKtbhoqpOd//sEnDEBonVFpy5AnoS:16mITdhoYZonjpy5aoS
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2832-27-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/2832-30-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/2832-24-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/2832-45-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2856 ìÅÒ«]V097Õýʽ°æ.exe 2832 svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe -
resource yara_rule behavioral1/files/0x000d0000000133b8-8.dat vmprotect behavioral1/memory/2856-19-0x0000000000400000-0x000000000057D000-memory.dmp vmprotect behavioral1/memory/2856-18-0x0000000000400000-0x000000000057D000-memory.dmp vmprotect behavioral1/memory/2856-43-0x0000000000400000-0x000000000057D000-memory.dmp vmprotect behavioral1/memory/2856-44-0x0000000000400000-0x000000000057D000-memory.dmp vmprotect behavioral1/memory/2856-46-0x0000000000400000-0x000000000057D000-memory.dmp vmprotect behavioral1/memory/2856-49-0x0000000000400000-0x000000000057D000-memory.dmp vmprotect behavioral1/memory/2856-52-0x0000000000400000-0x000000000057D000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX9DDF6F22 = "C:\\Windows\\XXXXXX9DDF6F22\\svchsot.exe" svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ìÅÒ«]V097Õýʽ°æ.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2832 svchost.exe 2832 svchost.exe 2832 svchost.exe 2856 ìÅÒ«]V097Õýʽ°æ.exe 2856 ìÅÒ«]V097Õýʽ°æ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2856 ìÅÒ«]V097Õýʽ°æ.exe Token: SeDebugPrivilege 2856 ìÅÒ«]V097Õýʽ°æ.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 2856 ìÅÒ«]V097Õýʽ°æ.exe 2856 ìÅÒ«]V097Õýʽ°æ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2856 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 30 PID 2868 wrote to memory of 2856 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 30 PID 2868 wrote to memory of 2856 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 30 PID 2868 wrote to memory of 2856 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 30 PID 2868 wrote to memory of 2832 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 31 PID 2868 wrote to memory of 2832 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 31 PID 2868 wrote to memory of 2832 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 31 PID 2868 wrote to memory of 2832 2868 2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-14_7c26033e3697a3d4d4165b588a9386b9_icedid_nymaim.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\ìÅÒ«]V097Õýʽ°æ.exe"C:\Users\Admin\AppData\Local\Temp\ìÅÒ«]V097Õýʽ°æ.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
572KB
MD50aa18bedf568f51ce14937585edb13d7
SHA1c4da60e0b2ddbfd3f340e572709939805917234a
SHA25676cb3e16397dd81edba0887c28dc8e844c5e4d9157714a1e576bda86d3c8654e
SHA512beac97d36d0c584a0b7466e58de6f66b93ff9468f715fb919ce93f027e1eda7a93e05ea302e7a6f7d036e234d6afd2e166de9eaeb57347f0dac10c046f1d3771
-
Filesize
424KB
MD5bf0fc1b558bebb2793d23974d92c8238
SHA1dad05d84cdbb9fe5ae09f8a1a3736509e703f168
SHA25629297b1a2f4c1802d3711a6ca0011d226e46cd9d4e035936950b784662427a7a
SHA512b5fb9c368d77b9f020ce55042c3836717a8d3c4b6ce153a1ddd61e417fbb9aae49f30f525c8a50f8243a9c2228a35b553888d26cb035340025047473fd840507