Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe
Resource
win7-20231215-en
General
-
Target
2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe
-
Size
284KB
-
MD5
a1af92491a9e626e0c2ba624f0b3af1e
-
SHA1
b122341d56d619de0d25b4198fc071be2cd44a70
-
SHA256
d3904bfc172d013a6f4a13b6730a64eb2b48cdb0290f410b946f995224e1f4fa
-
SHA512
1adbcde1c3de3c368794c98023a61df757c85d8b0f75f08b6d1751e1653109c32a9e41c4168c2578b473c173681495edb9fb4d20c8aa9d00555a76f1acde373c
-
SSDEEP
6144:hlDx7mlcAZBcIdqkorDfoR/0C1fzDB9ePHSJ:hlDx7mlHZo7HoRv177ePH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3816 sethome8000.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\system\sethome8000.exe 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe File created \??\c:\windows\system\sethome8000.exe 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.baiduo.org/" 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4404 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe 4404 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4324 svchost.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4404 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe 4404 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe 4404 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe 4404 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe 3816 sethome8000.exe 3816 sethome8000.exe 3816 sethome8000.exe 3816 sethome8000.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4404 wrote to memory of 3816 4404 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe 101 PID 4404 wrote to memory of 3816 4404 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe 101 PID 4404 wrote to memory of 3816 4404 2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_a1af92491a9e626e0c2ba624f0b3af1e_icedid.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4404 -
\??\c:\windows\system\sethome8000.exec:\windows\system\sethome8000.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3816
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:856
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Internet Explorer.lnk
Filesize1KB
MD57ab7e1e08e584a6ad92eb71f7c3bd8d0
SHA1427d6599918fe7796c31395de98d064ef5525c3e
SHA25616c3dc6b89e3d6e9d807b59a7f152ae80579efc70809589c9a3dbee658404575
SHA512d7778f9c0a94a77bd10d995da0b0dd5617785a9ce0cce64ab4d174fb6ed4b40a209ba5d327358b15af1942f1a56a84319932b10ba8cfe4f27efb3d66e8fe3cb5
-
Filesize
1KB
MD5dc976ee4a8c89e2ce30e348bed43ae52
SHA1733c09e459f9a55a10105ac7bd768743227d8b92
SHA256ee0576a586c9527b1dc1a6ac5af6610a5f2725f6ed1a33854a1b60376e6bf41d
SHA5123dc7b0972a5d90c23a058eb4c6ae718f335f027b1d3ecafda2e9e7271c4089db6e7df0571858955f3162acf864f8723933a2704a736639d33601fab0f757ff24
-
Filesize
284KB
MD571db0d0363e7fdc4d6607a60cd19bb5b
SHA17ffbe2adcf418e3d909df8562db956c7b44f4b39
SHA2566cb43d5d5ad32994780fca601d16460be5b5913e02bf65d41e0e1f39b6a584c8
SHA51273b0b43370fddbec9cbf4b027d3b2c36015d5062e198625a5be506cfa85144963a917ea576bf5f69e5d4cdbed32bfc16ba9e05352b9c7c56ef8ed6f516776e3e