Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2025, 12:38

General

  • Target

    2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe

  • Size

    11.2MB

  • MD5

    85d2c8e0e00f4750107bac6f6b0b3445

  • SHA1

    f7ac1bdd43a02ac231cbd4be56c1a270f3777a88

  • SHA256

    0c744a4f4902b8c94b87fa579065e1fb2d5f6f2d27a6ebbdff6f3501e2e78c35

  • SHA512

    f9eaccfa9f8815f285f4ad2183997f11ab4c3a17c319b18df0a0ca6153c66a24d0dd99e90c996bbf2244e6bb875c78a4a2aaa0e64e92e7a42aa5962a659d8192

  • SSDEEP

    196608:i4eQZYLJnBg4D2R+Nk3RbBzs/6hkP8S9qRZKzPWz2X2+twU2HfyjLfazM0+WsDRD:3ZYRDxk3RtgOkPJyZcXJz2/6LizmzVHH

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a Windows Service
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Users\Admin\AppData\Roaming\Server.exe
      "C:\Users\Admin\AppData\Roaming\Server.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Temp\._cache_Server.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Server.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2800
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2924
        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1496
    • C:\Users\Admin\AppData\Roaming\Onetap (1).exe
      "C:\Users\Admin\AppData\Roaming\Onetap (1).exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2948
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe Win7
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2652
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\._cache_Server.exe

    Filesize

    421KB

    MD5

    a857b537e8649f06ef10a9960fbfb137

    SHA1

    a4e5e981e485d7eff80a60273e980e1dd55c1211

    SHA256

    27e5eae57a9eb81305e03e9c29692f605569e50203ea9bb428c86bc57fca11ca

    SHA512

    cb8d47037cb61432de00132bdda7dd8722db65a2f66384613b8ef9ad5e4f33090131aca2d88b0d72328d4f737f55799dcaa1cc93986cf8621fb781da26ed6dbc

  • C:\Users\Admin\AppData\Local\Temp\wk14jNdt.xlsm

    Filesize

    24KB

    MD5

    ee100ba1df7d20ad12ef9f3fbaadbbf1

    SHA1

    d2874474a6811ab7be780eb88e353e10ba581021

    SHA256

    64b0067a6e1f04bd0d1d998e752cf09bc8e1228abd578f252005fc7ee4aae2ca

    SHA512

    1dc7d680993a13900a0c8fc303016e74f9c644cf9c42d135aefe5fcdff272605dfcc14ba73db39d7ac141e8bb56364d68fdb2eacfd3589e553382302fa4e7e5c

  • C:\Users\Admin\AppData\Local\Temp\wk14jNdt.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\wk14jNdt.xlsm

    Filesize

    29KB

    MD5

    e53f21e6a08fdb5d1973ccd8bd293d9d

    SHA1

    0816dc8e14ca7297b9573c326ed6a95dd748248f

    SHA256

    71329910e1fe8d6f250f0f4766bfdff6b8de3f5d754007553ef33267679d2b9d

    SHA512

    b031ad05f8c952e0518b0e8aeef004528cb4c5e5d84d38d503f215b7d3738b3da9219cef6ca860773c0c9134ec038c45ef58573cd4b6c2a6e50d16c09634fc5c

  • C:\Users\Admin\AppData\Local\Temp\wk14jNdt.xlsm

    Filesize

    31KB

    MD5

    4966af34fe4d8942251343438cb43e88

    SHA1

    b7c29f72177410c9a7af99bf383e0d53988c1b4c

    SHA256

    34e123046cb74792746c8375d042d3496fe1c1bb471550872b970df9f82525b8

    SHA512

    2126578577e5c347aabdebbd4a67148ac2d4b7fc35f8ab30bab3c7871bd1208eb04ea1c39da48de416b644833ca1337191141eaec06c9fc1a4f12506a847026b

  • C:\Users\Admin\AppData\Local\Temp\wk14jNdt.xlsm

    Filesize

    28KB

    MD5

    9316bae989bb1a96838beff0fcf2d26c

    SHA1

    d0e5bb701493c6e38e7a51e2dbcefe4e102adae5

    SHA256

    a6d929dbc00c885c12ba57e7e42bbf65da7a39ed8f6d10ecc3214277203f89bd

    SHA512

    fda64cc1beffdca86459391c02773d52551e975eb4130e49dc95e63f88a4a8dba577b3194a6f3357700c668ec55fab14b8ae52533ce42cfa95a1ceb978cf58fa

  • C:\Users\Admin\AppData\Local\Temp\wk14jNdt.xlsm

    Filesize

    26KB

    MD5

    5a2f816ac8abe86fcf413710d2ee373e

    SHA1

    224fdd181e71f146c13410ba3c1bb5d6aa26b1ed

    SHA256

    54f6ee8ff6111eda5ef55f18b81bc4ae6b9dc1a3b130618f93b0fed40cd385e8

    SHA512

    16318f8696ef69338ca5e43e48d16fe4efdb05af5a4dbf957a15dd9832ecf9c0ca866e68bfe075d955dee1df37df9b6a49d1e22c6fca51098f9e73163b775583

  • C:\Users\Admin\AppData\Roaming\Onetap (1).exe

    Filesize

    9.1MB

    MD5

    7309886b94ed89dbf84e663891b210aa

    SHA1

    64639fcc149630306e91523428f3e35b5fa38d1f

    SHA256

    aead45444baba74dfbf623c46189e9fd6b29c07839cb2e0ed414138bdf84c1cf

    SHA512

    d65339e0b5590a4b17d185a53596fad09762b1d6b7b633bc1469e3a2131350caab6e9e0739da5e830d7069861aa6308e5db11c13b4be6bd42ce95164bec49e0a

  • C:\Users\Admin\Desktop\~$WatchGrant.xlsx

    Filesize

    165B

    MD5

    ff09371174f7c701e75f357a187c06e8

    SHA1

    57f9a638fd652922d7eb23236c80055a91724503

    SHA256

    e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8

    SHA512

    e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882

  • \Users\Admin\AppData\Roaming\Server.exe

    Filesize

    1.1MB

    MD5

    5ef868a2db9378a57d854c6c1f6257ad

    SHA1

    a7eb959eae127311d466adb45be4983ed1dc03da

    SHA256

    6b8f8725c13cf835a72b49583cd139c5e801ffc5983efbec1dbdb198d5dd55c9

    SHA512

    cd4e4c6604a653b0e8646659c578c0f2c59c0669c7a7fedafc283ca18b112057da443e37dff9f8eee14b715917f1fa4a195fffd790900a35121b0ea87643ae2d

  • memory/1980-88-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2168-65-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/2800-84-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2800-52-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB

  • memory/2924-179-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/2924-180-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/2924-214-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/2948-30-0x0000000140000000-0x000000014124B000-memory.dmp

    Filesize

    18.3MB

  • memory/2948-20-0x0000000077420000-0x0000000077422000-memory.dmp

    Filesize

    8KB

  • memory/2948-25-0x0000000077430000-0x0000000077432000-memory.dmp

    Filesize

    8KB

  • memory/2948-27-0x0000000077430000-0x0000000077432000-memory.dmp

    Filesize

    8KB

  • memory/2948-29-0x0000000077430000-0x0000000077432000-memory.dmp

    Filesize

    8KB

  • memory/2948-22-0x0000000077420000-0x0000000077422000-memory.dmp

    Filesize

    8KB

  • memory/2948-24-0x0000000077420000-0x0000000077422000-memory.dmp

    Filesize

    8KB