Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03/01/2025, 12:38
Behavioral task
behavioral1
Sample
2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe
-
Size
11.2MB
-
MD5
85d2c8e0e00f4750107bac6f6b0b3445
-
SHA1
f7ac1bdd43a02ac231cbd4be56c1a270f3777a88
-
SHA256
0c744a4f4902b8c94b87fa579065e1fb2d5f6f2d27a6ebbdff6f3501e2e78c35
-
SHA512
f9eaccfa9f8815f285f4ad2183997f11ab4c3a17c319b18df0a0ca6153c66a24d0dd99e90c996bbf2244e6bb875c78a4a2aaa0e64e92e7a42aa5962a659d8192
-
SSDEEP
196608:i4eQZYLJnBg4D2R+Nk3RbBzs/6hkP8S9qRZKzPWz2X2+twU2HfyjLfazM0+WsDRD:3ZYRDxk3RtgOkPJyZcXJz2/6LizmzVHH
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Executes dropped EXE 8 IoCs
pid Process 2168 Server.exe 2948 Onetap (1).exe 2800 ._cache_Server.exe 1268 Process not Found 2836 svchost.exe 2924 Synaptics.exe 2652 svchost.exe 1496 ._cache_Synaptics.exe -
Loads dropped DLL 9 IoCs
pid Process 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 2168 Server.exe 2168 Server.exe 2168 Server.exe 2168 Server.exe 2924 Synaptics.exe 2924 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Server.exe -
Creates a Windows Service
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2948 Onetap (1).exe -
resource yara_rule behavioral1/files/0x0007000000016c10-16.dat upx behavioral1/memory/2948-30-0x0000000140000000-0x000000014124B000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\svchost.exe ._cache_Server.exe File created C:\Windows\svchost.exe ._cache_Server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1980 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2948 Onetap (1).exe 2948 Onetap (1).exe 2948 Onetap (1).exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 2800 ._cache_Server.exe 2836 svchost.exe 2652 svchost.exe 1496 ._cache_Synaptics.exe 1496 ._cache_Synaptics.exe 1980 EXCEL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2168 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 29 PID 2612 wrote to memory of 2168 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 29 PID 2612 wrote to memory of 2168 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 29 PID 2612 wrote to memory of 2168 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 29 PID 2612 wrote to memory of 2948 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 30 PID 2612 wrote to memory of 2948 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 30 PID 2612 wrote to memory of 2948 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 30 PID 2612 wrote to memory of 2948 2612 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 30 PID 2168 wrote to memory of 2800 2168 Server.exe 31 PID 2168 wrote to memory of 2800 2168 Server.exe 31 PID 2168 wrote to memory of 2800 2168 Server.exe 31 PID 2168 wrote to memory of 2800 2168 Server.exe 31 PID 2168 wrote to memory of 2924 2168 Server.exe 33 PID 2168 wrote to memory of 2924 2168 Server.exe 33 PID 2168 wrote to memory of 2924 2168 Server.exe 33 PID 2168 wrote to memory of 2924 2168 Server.exe 33 PID 2836 wrote to memory of 2652 2836 svchost.exe 34 PID 2836 wrote to memory of 2652 2836 svchost.exe 34 PID 2836 wrote to memory of 2652 2836 svchost.exe 34 PID 2836 wrote to memory of 2652 2836 svchost.exe 34 PID 2924 wrote to memory of 1496 2924 Synaptics.exe 35 PID 2924 wrote to memory of 1496 2924 Synaptics.exe 35 PID 2924 wrote to memory of 1496 2924 Synaptics.exe 35 PID 2924 wrote to memory of 1496 2924 Synaptics.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Roaming\Server.exe"C:\Users\Admin\AppData\Roaming\Server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\._cache_Server.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Server.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
-
-
C:\Users\Admin\AppData\Roaming\Onetap (1).exe"C:\Users\Admin\AppData\Roaming\Onetap (1).exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\svchost.exeC:\Windows\svchost.exe Win72⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD5a857b537e8649f06ef10a9960fbfb137
SHA1a4e5e981e485d7eff80a60273e980e1dd55c1211
SHA25627e5eae57a9eb81305e03e9c29692f605569e50203ea9bb428c86bc57fca11ca
SHA512cb8d47037cb61432de00132bdda7dd8722db65a2f66384613b8ef9ad5e4f33090131aca2d88b0d72328d4f737f55799dcaa1cc93986cf8621fb781da26ed6dbc
-
Filesize
24KB
MD5ee100ba1df7d20ad12ef9f3fbaadbbf1
SHA1d2874474a6811ab7be780eb88e353e10ba581021
SHA25664b0067a6e1f04bd0d1d998e752cf09bc8e1228abd578f252005fc7ee4aae2ca
SHA5121dc7d680993a13900a0c8fc303016e74f9c644cf9c42d135aefe5fcdff272605dfcc14ba73db39d7ac141e8bb56364d68fdb2eacfd3589e553382302fa4e7e5c
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
29KB
MD5e53f21e6a08fdb5d1973ccd8bd293d9d
SHA10816dc8e14ca7297b9573c326ed6a95dd748248f
SHA25671329910e1fe8d6f250f0f4766bfdff6b8de3f5d754007553ef33267679d2b9d
SHA512b031ad05f8c952e0518b0e8aeef004528cb4c5e5d84d38d503f215b7d3738b3da9219cef6ca860773c0c9134ec038c45ef58573cd4b6c2a6e50d16c09634fc5c
-
Filesize
31KB
MD54966af34fe4d8942251343438cb43e88
SHA1b7c29f72177410c9a7af99bf383e0d53988c1b4c
SHA25634e123046cb74792746c8375d042d3496fe1c1bb471550872b970df9f82525b8
SHA5122126578577e5c347aabdebbd4a67148ac2d4b7fc35f8ab30bab3c7871bd1208eb04ea1c39da48de416b644833ca1337191141eaec06c9fc1a4f12506a847026b
-
Filesize
28KB
MD59316bae989bb1a96838beff0fcf2d26c
SHA1d0e5bb701493c6e38e7a51e2dbcefe4e102adae5
SHA256a6d929dbc00c885c12ba57e7e42bbf65da7a39ed8f6d10ecc3214277203f89bd
SHA512fda64cc1beffdca86459391c02773d52551e975eb4130e49dc95e63f88a4a8dba577b3194a6f3357700c668ec55fab14b8ae52533ce42cfa95a1ceb978cf58fa
-
Filesize
26KB
MD55a2f816ac8abe86fcf413710d2ee373e
SHA1224fdd181e71f146c13410ba3c1bb5d6aa26b1ed
SHA25654f6ee8ff6111eda5ef55f18b81bc4ae6b9dc1a3b130618f93b0fed40cd385e8
SHA51216318f8696ef69338ca5e43e48d16fe4efdb05af5a4dbf957a15dd9832ecf9c0ca866e68bfe075d955dee1df37df9b6a49d1e22c6fca51098f9e73163b775583
-
Filesize
9.1MB
MD57309886b94ed89dbf84e663891b210aa
SHA164639fcc149630306e91523428f3e35b5fa38d1f
SHA256aead45444baba74dfbf623c46189e9fd6b29c07839cb2e0ed414138bdf84c1cf
SHA512d65339e0b5590a4b17d185a53596fad09762b1d6b7b633bc1469e3a2131350caab6e9e0739da5e830d7069861aa6308e5db11c13b4be6bd42ce95164bec49e0a
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
1.1MB
MD55ef868a2db9378a57d854c6c1f6257ad
SHA1a7eb959eae127311d466adb45be4983ed1dc03da
SHA2566b8f8725c13cf835a72b49583cd139c5e801ffc5983efbec1dbdb198d5dd55c9
SHA512cd4e4c6604a653b0e8646659c578c0f2c59c0669c7a7fedafc283ca18b112057da443e37dff9f8eee14b715917f1fa4a195fffd790900a35121b0ea87643ae2d