Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe
-
Size
701KB
-
MD5
e9b22be94f71a738e1cff829700b8520
-
SHA1
3f5cf33e93c3dc7b18a69550f12b7b2888f64f9a
-
SHA256
ae4f4218c335c6566aee6608bd56c0e84a53d3a08beec5846d79cf0aad0784f6
-
SHA512
ae3041d0ecab807379f32533b98c5e835eb8a1683ea492504186c41ba78cc8e6a9c18bb2746c12335c74d75545ee781bcff0bc3ff688da8893a7b3019db79f2c
-
SSDEEP
12288:q7bSAcO9nmofU3f5JblvsXWhW3FPOlNTHlGvYPlP5IzC1fshUQCvLo2k:0HnmlJblvSdFP8THlhqe1kh7
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 10 IoCs
resource yara_rule behavioral2/memory/4868-2-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4868-0-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4868-5-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4868-7-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4868-4-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2756-20-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4868-25-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2756-27-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2756-29-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2756-33-0x0000000000400000-0x000000000040F000-memory.dmp INDICATOR_EXE_Packed_MPress -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe -
Deletes itself 1 IoCs
pid Process 3816 WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 4608 fdlaunchersa.exe 2756 fdlaunchersa.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2764 set thread context of 4868 2764 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe 84 PID 4608 set thread context of 2756 4608 fdlaunchersa.exe 91 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fdlaunchersa.exe 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fdlaunchersa.exe 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4868 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe 4868 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2764 wrote to memory of 4868 2764 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe 84 PID 2764 wrote to memory of 4868 2764 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe 84 PID 2764 wrote to memory of 4868 2764 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe 84 PID 2764 wrote to memory of 4868 2764 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe 84 PID 2764 wrote to memory of 4868 2764 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe 84 PID 4608 wrote to memory of 2756 4608 fdlaunchersa.exe 91 PID 4608 wrote to memory of 2756 4608 fdlaunchersa.exe 91 PID 4608 wrote to memory of 2756 4608 fdlaunchersa.exe 91 PID 4608 wrote to memory of 2756 4608 fdlaunchersa.exe 91 PID 4608 wrote to memory of 2756 4608 fdlaunchersa.exe 91 PID 4868 wrote to memory of 3816 4868 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe 92 PID 4868 wrote to memory of 3816 4868 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe 92 PID 4868 wrote to memory of 3816 4868 2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\2024-02-03_e9b22be94f71a738e1cff829700b8520_icedid.exe
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\2764.vbs"3⤵
- Deletes itself
PID:3816
-
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fdlaunchersa.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fdlaunchersa.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\fdlaunchersa.exe
- Executes dropped EXE
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD5f08109a35419671850cdf957caa30fdc
SHA122567ecc476e94204ae90d1faed27f7440766230
SHA25685cbfb08762f04d83f6edb59eda3f1f21ae21e1cf16d332c700f007808a9e1d7
SHA512d8637d66d366b413934acf3809ab51a031dd0401e7872e62e6ed2f1939c4ceb60ce5f8d5c46fcbf1e471876226bbcbcb4b04013985f7544b94fb30ede15ee7aa
-
Filesize
455KB
MD5c2b8829803304ac15dba39a575408446
SHA1c0e5461399bfaaab65adb506cf265a8fecf05830
SHA256e9df274d3a3d7c8fd87f1942137771e823385ad5da464134a4e489addde6e4fb
SHA512b4a9ed1e1c7a9736bf8e8469c6853f78d18fec5babc4df7220a3ceaa9ed08d8ef5f3d8a29a8279338d03cb39aa0358dcf9645b7e81dc47cde74289d581d29e3d
-
Filesize
68KB
MD56d9048a21d5bce7fd48a607765f2af5e
SHA180a11d97ba60f87ed74c160bd79e1d90d0dfdb27
SHA256f58087aa9de7d622890087523dc4b1f201acf5240e37a926dd02f2cbbe1308b8
SHA5125ec22d113510e69bb23e396887010424646b1166115bcb84a3c3fb63866ab7148211ea4c26f201dbf0f0767751ee0abdce896136696a1fc8890e176ad2f3e68e
-
Filesize
1.8MB
MD58c3c1ff1bd28dfb5f8ce9cac5175da08
SHA1c6deff82d26ce8ba49d4a744164987bb3237789d
SHA25605ca9e7febefa1e2f67dce199064191dd3c81a69a7e9d77b647defa3fddfaf83
SHA5121a5e4410ca6fce4c48f43b6dcb6fec9cb9e0d9625e947afe95712c07edbb8c46d1a7c4c2a36497406e6a69626ddd293036d543af81c48d0352791fe073a2a830