Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 01:21

General

  • Target

    2024-03-15_32bc0a7b28762f359a582601e29c03fe_icedid.exe

  • Size

    4.8MB

  • MD5

    32bc0a7b28762f359a582601e29c03fe

  • SHA1

    b3bb424533b4c32448b081fc799c056438615244

  • SHA256

    a75f33a11dfae22c89d316c96764a9c224b155508813b10b2653ad99398bb744

  • SHA512

    6fb9912b73444913d5e5b0bb450465028c5087b2e8c05c96ba4e17af7cb1be0559a0b19c5ab6d8cb67beef738f93beb69179ab6ba8372d845afbdbe4804b3408

  • SSDEEP

    98304:K8dH6yIUmsPUeeczoxUGm+cKAeIpFkKTpTmaFbh4kKVwlsxyOQ6:99IUPUpUGm+cJmGbhwCsxz9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-15_32bc0a7b28762f359a582601e29c03fe_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-15_32bc0a7b28762f359a582601e29c03fe_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Users\Admin\AppData\Local\Temp\CPE6D09.tmp\FlashRegistrar.exe
      C:\Users\Admin\AppData\Local\Temp\CPE6D09.tmp\FlashRegistrar.exe R C:\Users\Admin\AppData\Local\Temp\CPE6D09.tmp\Flash.ocx
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CPE6D09.tmp\Flash.ocx

    Filesize

    3.8MB

    MD5

    43c6acdfb92a18c3e516e6bd5f1acd51

    SHA1

    da52ab3e629720adf6c6a3a8f4d47d777a2425a7

    SHA256

    e87aec8f4fd23c6e2be44b504804e011154b80dcde5cbf9888d4660b0436a889

    SHA512

    58b86d2609b81fee47bfe956b1e62d9a5b959736af41a8ad568121d9b60926fc142c79190a8e234fa3c8724e61e04147d6b9ca4fdee57ef6f4579f15b2951722

  • C:\Users\Admin\AppData\Local\Temp\CPE6D09.tmp\Flash.ocx

    Filesize

    3.4MB

    MD5

    1cefdfba397e5a3db787dffc231b2728

    SHA1

    e0d8384d3bc4b3100e3193b6b90bba218f91d378

    SHA256

    a5d6efae8fc93a2b9ec7c9ebe94fee1df5793e756faa513fe7da6eaac42873b2

    SHA512

    cc94dda8f4a083eed9c4af80208206f121854e36e7bee77d83c4869679874cfc18640ad37ecba87d38699aa9bc946051e14f1f1f6e7f058ab85f2ac4a8d8b57e

  • C:\Users\Admin\AppData\Local\Temp\CPE6D09.tmp\FlashRegistrar.exe

    Filesize

    63KB

    MD5

    ed4bb3a88c0d63c029126e6e5cba625e

    SHA1

    f6bbc2ee6079b006e5c811f1e0a1a36a8aafdebc

    SHA256

    0538bc97b726aa5a4c90705f0141eb86b26e240ea035ae4d96211f985d6220dd

    SHA512

    cda6b6adcdfc08f1846bbc55a514793960d7bebe792e3ac032ace2b83d1f00ebabcc69263ab66b1f8ed22487bedc6c816e795a66955f04da28a33621fe717a9e

  • memory/4428-8-0x0000000004610000-0x0000000004611000-memory.dmp

    Filesize

    4KB