Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 06:26

General

  • Target

    2024-01-24_347c3bec223aac2780871cf91d7378f7_cobalt-strike_icedid.exe

  • Size

    669KB

  • MD5

    347c3bec223aac2780871cf91d7378f7

  • SHA1

    71c3b31df977a675fc2af8acbe793846b6a2b4c8

  • SHA256

    a71f1e987323b9cbbfba1e3e873be69b028ab5bf53ff9bce27b38579d8e55bc2

  • SHA512

    33503c62680f2dfbab75192bf02f855133b8f8936e16242ca72520fed4be23ee86b1b16be1227ef9ddad66aaea146e8edac832d7e30fd9e5b3490c64ead4d74b

  • SSDEEP

    12288:92rmpX7iCfXYiEYfHT+77Opq/0H6qgNC74DT/0T9z6ev8z3JuJSj+aMQzVFHpbpn:9C0+yQAMvtaOCcS7K9dyPQXdAgzf7T

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_347c3bec223aac2780871cf91d7378f7_cobalt-strike_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_347c3bec223aac2780871cf91d7378f7_cobalt-strike_icedid.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\ddegw\DDEGW.ini

    Filesize

    495B

    MD5

    f18ec20df671c374bf8dac8b6b77b313

    SHA1

    98a0dfd22ae583d7cb6ebc95591f2133624ef251

    SHA256

    e7662988d0f9edd366a1bda975a9273702fc8dd4862528449243690a4ff79376

    SHA512

    82a892f34f1f6e60d08c2ca1760ae209ceba14c76f7d582810c92ff42c48dbc28b9f2bda4716782dd67222ac244cd52f4916a86a4c08bc60ce246aeced54e589

  • C:\Users\Admin\AppData\Local\Temp\ddegw.log

    Filesize

    406B

    MD5

    f83a7327d97acdd0381728534710c1ab

    SHA1

    29b633eb16c71a5f88fe4ef2e355ae1a4a0a3340

    SHA256

    304a3ab270ef57d171d1ab5df7bb8ba093c8855397c505c8517f2add3004bb39

    SHA512

    b6cb8da0867f1b23b1f02538b39043c3a2ef6cafbec506fb267be3c9e321f42a821fe05227cdfc30501daa3fa78b8fbc0e7454ffb4624d0c49ca9306ce603664

  • C:\Users\Admin\AppData\Local\ddegw\ddegw.log

    Filesize

    1KB

    MD5

    cded51820f66b045087f4a1514e14a83

    SHA1

    eaebd125f7892f1514bb89a284a9896c134635af

    SHA256

    b9c207010999fb57743e3982b39f441b701f2ef063325b396fbf1127dbb83f78

    SHA512

    6d67dc9114994f88e8cb01621018a829026d67ca0d18a2f6b84b51daf8a323125419adbc22dc5eff0ecad81f80d2c609ce292e8d71e2b0a4a598e65abbd63cf8

  • C:\Users\Admin\AppData\Local\ddegw\ddegw.log

    Filesize

    4KB

    MD5

    630a7a919edab1e96023b65dffaacaaf

    SHA1

    25de11add5639b9d50eb32d65595fa9bde2d2ad2

    SHA256

    b9f2eeeb8a2d41f7947e9cc14470a01ce0afa5693a11767d0b59ef48e70e2742

    SHA512

    0e4b3b667917f9bd1ddaa27b4fafe509d74388a9cb757bc50685eb17b652a204d2029d9bdcd2193fd7f0ee19b719c6ee9dfd8cc5f1a3e1f08813c254f4395516

  • C:\Users\Admin\AppData\Local\ddegw\ddegw.log

    Filesize

    5KB

    MD5

    72c692751063179b050f3fa20e0847d1

    SHA1

    9105d5ce354db801f924d586f7a598fb80eea690

    SHA256

    5ae090e5528a82c897d6b9f19f4fe8134c97304de0b32fb26be3a5e1ca918b38

    SHA512

    8477bfb2f2445c1037477da89b8e21f07a66598b52e900562a13034324b48f1cfd45ecdcde637f47ebae9c6e20d11b9e77f3347303c11df9075e906c58de2ac0