Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe
-
Size
2.7MB
-
MD5
7b7f19d6d192923fbd6f91878d7a9370
-
SHA1
d7b269bb4a6994b0e96daaaa96fe4b540136bdaf
-
SHA256
de3b549c955350b574bf9074cacedb097b0a7195e065a59cf7a77295b3726fe1
-
SHA512
3b66bcb7fece93e1a8bb736931cefd9caf05e50b1751da69ec63504134b3f565c48d6ba096e38e4fcec4bbb8cfb31653710a4d9eab6c741b0db626783f93edca
-
SSDEEP
49152:MzewFQU04nOSem7VjKtnbVkjuuNw6tLf:MzB0SOStj2kF5N
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Executes dropped EXE 1 IoCs
pid Process 884 conhost.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt regini.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: conhost.exe File opened (read-only) \??\X: conhost.exe File opened (read-only) \??\E: conhost.exe File opened (read-only) \??\H: conhost.exe File opened (read-only) \??\J: conhost.exe File opened (read-only) \??\S: conhost.exe File opened (read-only) \??\K: conhost.exe File opened (read-only) \??\M: conhost.exe File opened (read-only) \??\R: conhost.exe File opened (read-only) \??\O: conhost.exe File opened (read-only) \??\V: conhost.exe File opened (read-only) \??\W: conhost.exe File opened (read-only) \??\Y: conhost.exe File opened (read-only) \??\Z: conhost.exe File opened (read-only) \??\G: conhost.exe File opened (read-only) \??\L: conhost.exe File opened (read-only) \??\N: conhost.exe File opened (read-only) \??\U: conhost.exe File opened (read-only) \??\I: conhost.exe File opened (read-only) \??\P: conhost.exe File opened (read-only) \??\T: conhost.exe -
pid Process 1400 ARP.EXE -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3256 tasklist.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
pid Process 1080 NETSTAT.EXE -
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 3488 net.exe 1296 net.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1080 NETSTAT.EXE 4448 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2980 systeminfo.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile regini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile regini.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1080 NETSTAT.EXE Token: SeDebugPrivilege 3256 tasklist.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2612 wrote to memory of 64 2612 2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe 82 PID 2612 wrote to memory of 64 2612 2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe 82 PID 2612 wrote to memory of 64 2612 2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe 82 PID 2612 wrote to memory of 884 2612 2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe 85 PID 2612 wrote to memory of 884 2612 2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe 85 PID 2612 wrote to memory of 884 2612 2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe 85 PID 884 wrote to memory of 2660 884 conhost.exe 86 PID 884 wrote to memory of 2660 884 conhost.exe 86 PID 884 wrote to memory of 2660 884 conhost.exe 86 PID 884 wrote to memory of 4388 884 conhost.exe 88 PID 884 wrote to memory of 4388 884 conhost.exe 88 PID 884 wrote to memory of 4388 884 conhost.exe 88 PID 4388 wrote to memory of 4260 4388 cmd.exe 90 PID 4388 wrote to memory of 4260 4388 cmd.exe 90 PID 4388 wrote to memory of 4260 4388 cmd.exe 90 PID 4260 wrote to memory of 5028 4260 net.exe 91 PID 4260 wrote to memory of 5028 4260 net.exe 91 PID 4260 wrote to memory of 5028 4260 net.exe 91 PID 4388 wrote to memory of 716 4388 cmd.exe 92 PID 4388 wrote to memory of 716 4388 cmd.exe 92 PID 4388 wrote to memory of 716 4388 cmd.exe 92 PID 716 wrote to memory of 2156 716 net.exe 93 PID 716 wrote to memory of 2156 716 net.exe 93 PID 716 wrote to memory of 2156 716 net.exe 93 PID 4388 wrote to memory of 4760 4388 cmd.exe 94 PID 4388 wrote to memory of 4760 4388 cmd.exe 94 PID 4388 wrote to memory of 4760 4388 cmd.exe 94 PID 4760 wrote to memory of 2496 4760 net.exe 95 PID 4760 wrote to memory of 2496 4760 net.exe 95 PID 4760 wrote to memory of 2496 4760 net.exe 95 PID 4388 wrote to memory of 1080 4388 cmd.exe 96 PID 4388 wrote to memory of 1080 4388 cmd.exe 96 PID 4388 wrote to memory of 1080 4388 cmd.exe 96 PID 4388 wrote to memory of 3256 4388 cmd.exe 97 PID 4388 wrote to memory of 3256 4388 cmd.exe 97 PID 4388 wrote to memory of 3256 4388 cmd.exe 97 PID 4388 wrote to memory of 4448 4388 cmd.exe 99 PID 4388 wrote to memory of 4448 4388 cmd.exe 99 PID 4388 wrote to memory of 4448 4388 cmd.exe 99 PID 4388 wrote to memory of 1400 4388 cmd.exe 102 PID 4388 wrote to memory of 1400 4388 cmd.exe 102 PID 4388 wrote to memory of 1400 4388 cmd.exe 102 PID 4388 wrote to memory of 2980 4388 cmd.exe 103 PID 4388 wrote to memory of 2980 4388 cmd.exe 103 PID 4388 wrote to memory of 2980 4388 cmd.exe 103 PID 4388 wrote to memory of 3260 4388 cmd.exe 106 PID 4388 wrote to memory of 3260 4388 cmd.exe 106 PID 4388 wrote to memory of 3260 4388 cmd.exe 106 PID 4388 wrote to memory of 3488 4388 cmd.exe 107 PID 4388 wrote to memory of 3488 4388 cmd.exe 107 PID 4388 wrote to memory of 3488 4388 cmd.exe 107 PID 4388 wrote to memory of 1296 4388 cmd.exe 111 PID 4388 wrote to memory of 1296 4388 cmd.exe 111 PID 4388 wrote to memory of 1296 4388 cmd.exe 111 PID 4388 wrote to memory of 4064 4388 cmd.exe 114 PID 4388 wrote to memory of 4064 4388 cmd.exe 114 PID 4388 wrote to memory of 4064 4388 cmd.exe 114 PID 4064 wrote to memory of 3548 4064 net.exe 115 PID 4064 wrote to memory of 3548 4064 net.exe 115 PID 4064 wrote to memory of 3548 4064 net.exe 115 PID 884 wrote to memory of 860 884 conhost.exe 116 PID 884 wrote to memory of 860 884 conhost.exe 116 PID 884 wrote to memory of 860 884 conhost.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-01_7b7f19d6d192923fbd6f91878d7a9370_icedid_nymaim.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\regini.exeregini.exe C:\Users\Admin\AppData\Local\Temp\ppxxxx2⤵
- Modifies system executable filetype association
- Modifies registry class
PID:64
-
-
C:\Users\Admin\AppData\Local\Temp\conhost.exeC:\Users\Admin\AppData\Local\Temp\conhost.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\regini.exeregini.exe C:\Users\Admin\AppData\Local\Temp\ppxxxx3⤵
- Modifies registry class
PID:2660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\must.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\net.exenet user4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user5⤵
- System Location Discovery: System Language Discovery
PID:5028
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administrators4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
C:\Windows\SysWOW64\net.exenet start4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start5⤵
- System Location Discovery: System Language Discovery
PID:2496
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -ano4⤵
- System Location Discovery: System Language Discovery
- System Network Connections Discovery
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4448
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a4⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1400
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:2980
-
-
C:\Windows\SysWOW64\net.exenet use4⤵
- System Location Discovery: System Language Discovery
PID:3260
-
-
C:\Windows\SysWOW64\net.exenet view4⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:3488
-
-
C:\Windows\SysWOW64\net.exenet view /domain4⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:1296
-
-
C:\Windows\SysWOW64\net.exenet user /domain4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user /domain5⤵
- System Location Discovery: System Language Discovery
PID:3548
-
-
-
-
C:\Windows\SysWOW64\regini.exeregini.exe C:\Users\Admin\AppData\Local\Temp\ppxxxx3⤵PID:860
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Account Manipulation
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD57b7f19d6d192923fbd6f91878d7a9370
SHA1d7b269bb4a6994b0e96daaaa96fe4b540136bdaf
SHA256de3b549c955350b574bf9074cacedb097b0a7195e065a59cf7a77295b3726fe1
SHA5123b66bcb7fece93e1a8bb736931cefd9caf05e50b1751da69ec63504134b3f565c48d6ba096e38e4fcec4bbb8cfb31653710a4d9eab6c741b0db626783f93edca
-
Filesize
562B
MD5def72a2e815d36d1b207e69c53a0dfb6
SHA108c091cafbc4627d3e1953adeed04a4c0791f755
SHA256f71e998458a6ffbf157edd7c4d7bf5dcf2df92f769f459b1adb901e13d5d2a00
SHA5127c5755b82d4320000cc84bc1fdb1fdff2c4244b0849ee4eebc0529a9757e73cd1b3878255571ad00f0855ffc82dac4d6d43dc28e0b32151d4a97a122b81ab9ce
-
Filesize
70B
MD520eb0bd9744f943aff13206338fdfca8
SHA1b2f64c9fddeee998f2c52b9685c87fdaeed768fe
SHA2566efe03d7c079a715fa4b6bcd52332f08b1f89e840c10a220adfe7b8318626613
SHA512b674ac8a06a11be27bfac4a12785d0b85b8bc42f70ac519df0150d940914135cdd42450103131ef276be7e27a7213a3d640dead3168cf2e6cef8ccf7e2ddbb64
-
Filesize
135B
MD515e7eafedbdbb2788c5fde53e9d045e3
SHA1b868931638b4b3ea9c44821e7ade2ffd3255ef2b
SHA2564f1c84c3f30c5f8be30326254148b597568c0ce6ad45bd8fbddc6c9600505361
SHA512e0f21948299de152d17f6f8fd49d01223d19ce605ba77b5896d200e58abfcf49241c949b38120e84aa329d5469ac69067466d81c5260db741cfdcbcf4f0c0423
-
Filesize
16KB
MD59b0428687c0957d49c9bd87e9da51c9f
SHA1dbf51502ddebdc67f3129b9d6a1f5156b8b43128
SHA2561ae83c93b8c32dd030c867dc3960ebdd9a91a83aecf2780782e96b3bb74ad62e
SHA51286be0604de38049fb4e0a9b84429ce2f3992f18d37e5c0cc894980d9d5bfda3aa1f78a0d69f4bab65f4fbbfd8eee30320dc5ccbeb3584a25580295715d4ef0b7