Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10IcarusRDP_...os.exe
windows7-x64
3IcarusRDP_...os.exe
windows10-2004-x64
3IcarusRDP_...us.exe
windows7-x64
3IcarusRDP_...us.exe
windows10-2004-x64
3IcarusRDP_...sS.exe
windows7-x64
3IcarusRDP_...sS.exe
windows10-2004-x64
3IcarusRDP_...bb.exe
windows7-x64
3IcarusRDP_...bb.exe
windows10-2004-x64
7IcarusRDP_...bb.exe
windows7-x64
3IcarusRDP_...bb.exe
windows10-2004-x64
7IcarusRDP_...ok.exe
windows7-x64
3IcarusRDP_...ok.exe
windows10-2004-x64
3IcarusRDP_...er.exe
windows7-x64
10IcarusRDP_...er.exe
windows10-2004-x64
10IcarusRDP_...t2.exe
windows7-x64
10IcarusRDP_...t2.exe
windows10-2004-x64
10IcarusRDP_...t4.exe
windows7-x64
10IcarusRDP_...t4.exe
windows10-2004-x64
10IcarusRDP_...ta.exe
windows7-x64
1IcarusRDP_...ta.exe
windows10-2004-x64
1IcarusRDP_...ub.exe
windows7-x64
10IcarusRDP_...ub.exe
windows10-2004-x64
10IcarusRDP_...ile.js
windows7-x64
3IcarusRDP_...ile.js
windows10-2004-x64
3IcarusRDP_...api.js
windows7-x64
3IcarusRDP_...api.js
windows10-2004-x64
3IcarusRDP_...ram.js
windows7-x64
3IcarusRDP_...ram.js
windows10-2004-x64
3IcarusRDP_...er.exe
windows7-x64
3IcarusRDP_...er.exe
windows10-2004-x64
3IcarusRDP_...il.dll
windows7-x64
1IcarusRDP_...il.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2024, 19:33
Behavioral task
behavioral1
Sample
IcarusRDP_builder-main/Addon/BadAssMacros.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
IcarusRDP_builder-main/Addon/BadAssMacros.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
IcarusRDP_builder-main/Addon/Icarus.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
IcarusRDP_builder-main/Addon/Icarus.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
IcarusRDP_builder-main/Addon/IcarusS.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
IcarusRDP_builder-main/Addon/IcarusS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
IcarusRDP_builder-main/Addon/bb.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
IcarusRDP_builder-main/Addon/bb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
IcarusRDP_builder-main/Addon/bb.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
IcarusRDP_builder-main/Addon/bb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
IcarusRDP_builder-main/Addon/ebook.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
IcarusRDP_builder-main/Addon/ebook.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
IcarusRDP_builder-main/Addon/explorer.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
IcarusRDP_builder-main/Addon/explorer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
IcarusRDP_builder-main/Addon/net2.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
IcarusRDP_builder-main/Addon/net2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
IcarusRDP_builder-main/Addon/net4.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
IcarusRDP_builder-main/Addon/net4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
IcarusRDP_builder-main/Addon/ptata.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
IcarusRDP_builder-main/Addon/ptata.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
IcarusRDP_builder-main/Addon/stub.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
IcarusRDP_builder-main/Addon/stub.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
IcarusRDP_builder-main/BuildFile.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
IcarusRDP_builder-main/BuildFile.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
IcarusRDP_builder-main/KeyAuth/api.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
IcarusRDP_builder-main/KeyAuth/api.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
IcarusRDP_builder-main/Program.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
IcarusRDP_builder-main/Program.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
IcarusRDP_builder-main/bin/Release/net461/IcarusRDP_builder.exe
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
IcarusRDP_builder-main/bin/Release/net461/IcarusRDP_builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
IcarusRDP_builder-main/bin/Release/net461/Mono.Cecil.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
IcarusRDP_builder-main/bin/Release/net461/Mono.Cecil.dll
Resource
win10v2004-20241007-en
General
-
Target
IcarusRDP_builder-main/Addon/explorer.exe
-
Size
103KB
-
MD5
2bb438f0ee9a0d25dc671d23fd406922
-
SHA1
bfca33b343502bbdd9262069a89d526b37eb4717
-
SHA256
084bbe29892a4ee5063027533d4e793a6f689d3dbfe959b0e30bf03e375bcc53
-
SHA512
7a2cb14167899368d437cc3638fa420cbd3a6b9fcf5afaaad3186da12f5518effe78b6b4e06af770cf24c4cfb64e9d1d9c089fe1c7a8c231c1818d8556d1b4bb
-
SSDEEP
1536:NPkG0f9sc1Osw7oifKxZtW6CbqQf0aqu:NMG0f9sc1OFNKx9Cbnb
Malware Config
Extracted
xworm
ifestos.duckdns.org:4449
mtgbeTEFSBYScDUd
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral14/memory/5104-1-0x0000000000E50000-0x0000000000E70000-memory.dmp family_xworm behavioral14/files/0x000d000000023b47-8.dat family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 1688 explorer.exe 1552 explorer.exe 2576 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2552 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5104 explorer.exe Token: SeDebugPrivilege 1688 explorer.exe Token: SeDebugPrivilege 1552 explorer.exe Token: SeDebugPrivilege 2576 explorer.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5104 wrote to memory of 2552 5104 explorer.exe 87 PID 5104 wrote to memory of 2552 5104 explorer.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\IcarusRDP_builder-main\Addon\explorer.exe"C:\Users\Admin\AppData\Local\Temp\IcarusRDP_builder-main\Addon\explorer.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "explorer" /tr "C:\Users\Admin\AppData\Roaming\explorer.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2552
-
-
C:\Users\Admin\AppData\Roaming\explorer.exeC:\Users\Admin\AppData\Roaming\explorer.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
C:\Users\Admin\AppData\Roaming\explorer.exeC:\Users\Admin\AppData\Roaming\explorer.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
C:\Users\Admin\AppData\Roaming\explorer.exeC:\Users\Admin\AppData\Roaming\explorer.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
103KB
MD52bb438f0ee9a0d25dc671d23fd406922
SHA1bfca33b343502bbdd9262069a89d526b37eb4717
SHA256084bbe29892a4ee5063027533d4e793a6f689d3dbfe959b0e30bf03e375bcc53
SHA5127a2cb14167899368d437cc3638fa420cbd3a6b9fcf5afaaad3186da12f5518effe78b6b4e06af770cf24c4cfb64e9d1d9c089fe1c7a8c231c1818d8556d1b4bb