Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 04:42

General

  • Target

    2024-10-14_5736baf5cf78eb5887894c4cce25781f_icedid.exe

  • Size

    2.3MB

  • MD5

    5736baf5cf78eb5887894c4cce25781f

  • SHA1

    7e9193c8c5a8ccf1ee26c1d98cfafb8113ed82a9

  • SHA256

    aa4a398bd43817f8f010e61a9cd8bbd9b0bd378db634f42376933feb169eb45a

  • SHA512

    e5171b6903ea2e03efec9f37fcf5f18e3da1940ac63ac571bb81287e3ba7e70f5980382206e182bb6ec6d82b6ca5bbe0d352425641ab83820321ead6f7eba79e

  • SSDEEP

    49152:RlIe3PyF7Y4UHJitsFEnyowKnvaNnuAlxsz64xucBT2+b/:RlI7M4UpiBnHwKnvaNnuAlg64xuU

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 46 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-14_5736baf5cf78eb5887894c4cce25781f_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-14_5736baf5cf78eb5887894c4cce25781f_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\SUGUZEFHWD.dll"
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2312
    • C:\Users\Admin\AppData\Local\Temp\EnclosureDelude.exe
      "C:\Users\Admin\AppData\Local\Temp\EnclosureDelude.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2496
    • C:\Users\Admin\AppData\Local\Temp\EnclosureDelude.exe
      C:\Users\Admin\AppData\Local\Temp\EnclosureDelude.exe
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\SartorialTardy\AverHypotenuse.exe

    Filesize

    2.3MB

    MD5

    5736baf5cf78eb5887894c4cce25781f

    SHA1

    7e9193c8c5a8ccf1ee26c1d98cfafb8113ed82a9

    SHA256

    aa4a398bd43817f8f010e61a9cd8bbd9b0bd378db634f42376933feb169eb45a

    SHA512

    e5171b6903ea2e03efec9f37fcf5f18e3da1940ac63ac571bb81287e3ba7e70f5980382206e182bb6ec6d82b6ca5bbe0d352425641ab83820321ead6f7eba79e

  • C:\Users\Admin\AppData\Local\Temp\EnclosureDelude.exe

    Filesize

    28KB

    MD5

    619b4cf619eaebe531bb252e99cdd23b

    SHA1

    75131437e0039afc65aca67a7a54885b58b8054e

    SHA256

    cb6686fe656cba89761f291c52a77f9f5d9c50fa20d277d4e2e1bfa122e02402

    SHA512

    40a84a0a5b9246cff882a12e76b1e014fb9b6f018a637402f74bfd24155dd64b7a1ff519907a1e24b64ca1382a191adf6d29499d8f340426cb6876cd2fe3e6d3

  • C:\Windows\SUGUZEFHWD.dll

    Filesize

    2.3MB

    MD5

    aee40bc051ad8c031fb4eef90db2fa1e

    SHA1

    2d4404791b075a55a80a08c3e6067f982e55ddaa

    SHA256

    b43d40ecd8a22011c28f16581a7df82dc69f769f09f03dc2e065202cbf8d41dc

    SHA512

    04f6beec0f87c17ec7314b9dea5fa700f07d24137e35f188b7cd3716aa49f52e1e3cc065b7adbf10dd9651bdce79d663a50f20fa718390133025c1cc512552fa