Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 18:51 UTC

General

  • Target

    UFbjRkMGfw.ps1

  • Size

    59B

  • MD5

    219543beb2dbd3dd4a38133cb4cf5d62

  • SHA1

    a9f3bca1e95a8013e54a327ab471fa90f4d6fdec

  • SHA256

    ff4878fee00d54134fffa5ca90af7ec4892d7397dafe5ad8a319ab83f9b594ae

  • SHA512

    adfc8567036636ebcbd46d860eacdf55edaff7a56af5a65f0c4695fe2698fa8bc5c7afa1b75126450417516851b500bb3b8d1a1211dae279d6ef95c1621aab26

Malware Config

Extracted

Family

icedid

Campaign

1842176049

C2

carismortht.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Icedid family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\UFbjRkMGfw.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\notice.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:1436
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" 33667344.dll #1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2240

Network

  • flag-us
    DNS
    carismortht.com
    rundll32.exe
    Remote address:
    8.8.8.8:53
    Request
    carismortht.com
    IN A
    Response
No results found
  • 8.8.8.8:53
    carismortht.com
    dns
    rundll32.exe
    61 B
    134 B
    1
    1

    DNS Request

    carismortht.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1304-4-0x000007FEF5DBE000-0x000007FEF5DBF000-memory.dmp

    Filesize

    4KB

  • memory/1304-5-0x000000001B740000-0x000000001BA22000-memory.dmp

    Filesize

    2.9MB

  • memory/1304-7-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

    Filesize

    9.6MB

  • memory/1304-6-0x0000000001F80000-0x0000000001F88000-memory.dmp

    Filesize

    32KB

  • memory/1304-8-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

    Filesize

    9.6MB

  • memory/1304-9-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

    Filesize

    9.6MB

  • memory/1304-10-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

    Filesize

    9.6MB

  • memory/1304-11-0x000007FEF5B00000-0x000007FEF649D000-memory.dmp

    Filesize

    9.6MB

  • memory/2240-12-0x0000000180000000-0x0000000180009000-memory.dmp

    Filesize

    36KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.