Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe
-
Size
3.8MB
-
MD5
a0bf6f0601f924eeb9ff269b1e0e168e
-
SHA1
2bfc3341cd253c39c33eee7ce554a0a2ab2f34aa
-
SHA256
41536a1562a7a77adad86fc1d1f9296d296d5f67612e73c22b764f8f31ad2cd6
-
SHA512
887588a16a9793d34f2a3a09ec49db137171c53a0fca4e8194b6b0bd487f81b7e06d2609e38db33b9c05d78f9859f530ed30f717ee16db89dd6e29485be385e1
-
SSDEEP
49152:JVTD6aoiHVGUP4BhHbPFENwKiS//Q6rj0p8Eou/VoNYiNoAEITv7UQ:JVTD/fHVJ4BhHbFV63PuSNYiH7I
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\B: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\I: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\M: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\N: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\O: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\T: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\Y: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\A: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\G: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\J: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\L: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\P: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\Q: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\V: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\X: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\Z: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\E: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\H: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\K: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\R: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\S: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe File opened (read-only) \??\U: 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3276 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3276 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4444 wrote to memory of 2892 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe 84 PID 4444 wrote to memory of 2892 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe 84 PID 4444 wrote to memory of 2892 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe 84 PID 2892 wrote to memory of 3276 2892 cmd.exe 86 PID 2892 wrote to memory of 3276 2892 cmd.exe 86 PID 2892 wrote to memory of 3276 2892 cmd.exe 86 PID 2892 wrote to memory of 552 2892 cmd.exe 87 PID 2892 wrote to memory of 552 2892 cmd.exe 87 PID 2892 wrote to memory of 552 2892 cmd.exe 87 PID 4444 wrote to memory of 4640 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe 88 PID 4444 wrote to memory of 4640 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe 88 PID 4444 wrote to memory of 4640 4444 2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-20_a0bf6f0601f924eeb9ff269b1e0e168e_icedid.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\cmd.execmd /c netstat -ano|findstr ":47318 " > c:\~startingshot_test_port_tmp2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -ano3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\SysWOW64\findstr.exefindstr ":47318 "3⤵PID:552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del c:\~startingshot_test_port_tmp2⤵PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ShengquGames\StartingShot\StartingShotc31d6753e78a5f118af7d2e1af5d611b\dataupload.ssconf
Filesize589B
MD595fe52b705799744dec89dcdb9add7ba
SHA126f5bf1e7a5e4157a0290ddd9fd09e815f30a6e4
SHA256520b42e9f27e5fae21345d1359e6d242d44c32b11c4e2312039556c21af0e988
SHA5124b71c8f68392d24078fb8257601367d49c1c9ecaf5b05a0bcc88a733a98ae21ce46d608711fbe212b41c4e9da258ed1968e8c4d6b67ed21d695aa00844d700ee