Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnit.exe
Resource
win7-20240729-en
General
-
Target
2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnit.exe
-
Size
475KB
-
MD5
8f4dd5ca9a4a562957a3db2bd8137ff1
-
SHA1
a7afbcaa1b4019bbc0d1d689255446d2b9b5c804
-
SHA256
d6043b2dfaf5353a6c3b0182798d7c46bc43e6ca8a23f928889b1332e373a79e
-
SHA512
69904ef398b229d3c3c024e69bb04aef14bd97016bbcd941a656d0a8a139226e04c6b326a5f402c1e7e90e2c974aee6abf63ad0b19b33dc89eeba6f3e7e299fa
-
SSDEEP
6144:3aGlIYUIrf3M1Nnpfx58Mc+WOcclEaPRiZ2UC73OAOM+h7xmy8fBgFb4tz+QGWw:3ryP1zfMeZnO23ay+hUBg5wz+QC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2416 2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnitmgr.exe -
resource yara_rule behavioral2/files/0x0009000000023c6d-3.dat upx behavioral2/memory/2416-4-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2416-9-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1540 2416 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnitmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2416 4588 2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnit.exe 85 PID 4588 wrote to memory of 2416 4588 2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnit.exe 85 PID 4588 wrote to memory of 2416 4588 2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnit.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnit.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnit.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnitmgr.exeC:\Users\Admin\AppData\Local\Temp\2024-10-03_8f4dd5ca9a4a562957a3db2bd8137ff1_icedid_ramnitmgr.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 2643⤵
- Program crash
PID:1540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2416 -ip 24161⤵PID:4700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD598a8ced05b34189b8b36760049b2ea36
SHA1a5271250fb91d891c7df0cae7812ed68907ae076
SHA256e50689964fa016ff34ad6517bb863e26e571f907635e719f1fe5e70a61763d95
SHA5128548b7dc08007fe55e2b7f9bf502c7271655edff52100bb8445a321f37137139c0cd54f7f85558a2f99b38dd574c8435371adc07f8c365bf8a8561c63fe6be45