Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 20:53
Behavioral task
behavioral1
Sample
2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe
Resource
win7-20230831-en
General
-
Target
2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe
-
Size
4.0MB
-
MD5
e8df7f21de1a5b5c02f7a938248a4eee
-
SHA1
78aeba0b6170d8b8ef9890e131cd85d7e68a3b2d
-
SHA256
92a9266a0c9d6a31670cd87db06f10fa65b936c77e6e94a38e86219f91df3098
-
SHA512
faec10b43975f7f46c0ad3dccd7d008d372bc7d187cf1e9e2bf564949240a30aeeeb3c97a2b59a497eaa815f6e75cc30c2d4e95da3dd1f8f1f3824c974f60acf
-
SSDEEP
98304:ALkCqK9jITuvn4LNfYWVV0FLOAkGkzdnEVomFHKnPn:UkCqM5AnV0FLOyomFHKnPn
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023127-2.dat family_blackmoon behavioral2/files/0x000a000000023127-3.dat family_blackmoon behavioral2/files/0x000a000000023127-5.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe -
Executes dropped EXE 3 IoCs
pid Process 3808 wIEtYKLUkYhyQ.exe 700 wIEtYKLUkYhyQ.exe 3732 wIEtYKLUkYhyQ.exe -
resource yara_rule behavioral2/memory/3732-6-0x00000000009A0000-0x00000000009AB000-memory.dmp upx behavioral2/memory/3732-7-0x00000000009A0000-0x00000000009AB000-memory.dmp upx behavioral2/memory/3732-8-0x00000000009A0000-0x00000000009AB000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wIEtYKLUkYhyQ.exe 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe File opened for modification C:\Windows\SysWOW64\wIEtYKLUkYhyQ.exe 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4952 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4952 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe 3808 wIEtYKLUkYhyQ.exe 700 wIEtYKLUkYhyQ.exe 3732 wIEtYKLUkYhyQ.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3808 4952 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe 86 PID 4952 wrote to memory of 3808 4952 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe 86 PID 4952 wrote to memory of 3808 4952 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe 86 PID 700 wrote to memory of 3732 700 wIEtYKLUkYhyQ.exe 89 PID 700 wrote to memory of 3732 700 wIEtYKLUkYhyQ.exe 89 PID 700 wrote to memory of 3732 700 wIEtYKLUkYhyQ.exe 89 PID 4952 wrote to memory of 3792 4952 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe 91 PID 4952 wrote to memory of 3792 4952 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe 91 PID 4952 wrote to memory of 3792 4952 2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_e8df7f21de1a5b5c02f7a938248a4eee_icedid_JC.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\wIEtYKLUkYhyQ.exe-auto2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2023-0~1.EXE > nul2⤵PID:3792
-
-
C:\Windows\SysWOW64\wIEtYKLUkYhyQ.exeC:\Windows\SysWOW64\wIEtYKLUkYhyQ.exe Service 11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\wIEtYKLUkYhyQ.exe-OBJECT12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5e8df7f21de1a5b5c02f7a938248a4eee
SHA178aeba0b6170d8b8ef9890e131cd85d7e68a3b2d
SHA25692a9266a0c9d6a31670cd87db06f10fa65b936c77e6e94a38e86219f91df3098
SHA512faec10b43975f7f46c0ad3dccd7d008d372bc7d187cf1e9e2bf564949240a30aeeeb3c97a2b59a497eaa815f6e75cc30c2d4e95da3dd1f8f1f3824c974f60acf
-
Filesize
4.0MB
MD5e8df7f21de1a5b5c02f7a938248a4eee
SHA178aeba0b6170d8b8ef9890e131cd85d7e68a3b2d
SHA25692a9266a0c9d6a31670cd87db06f10fa65b936c77e6e94a38e86219f91df3098
SHA512faec10b43975f7f46c0ad3dccd7d008d372bc7d187cf1e9e2bf564949240a30aeeeb3c97a2b59a497eaa815f6e75cc30c2d4e95da3dd1f8f1f3824c974f60acf
-
Filesize
4.0MB
MD5e8df7f21de1a5b5c02f7a938248a4eee
SHA178aeba0b6170d8b8ef9890e131cd85d7e68a3b2d
SHA25692a9266a0c9d6a31670cd87db06f10fa65b936c77e6e94a38e86219f91df3098
SHA512faec10b43975f7f46c0ad3dccd7d008d372bc7d187cf1e9e2bf564949240a30aeeeb3c97a2b59a497eaa815f6e75cc30c2d4e95da3dd1f8f1f3824c974f60acf