Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2025, 12:38
Behavioral task
behavioral1
Sample
2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe
-
Size
11.2MB
-
MD5
85d2c8e0e00f4750107bac6f6b0b3445
-
SHA1
f7ac1bdd43a02ac231cbd4be56c1a270f3777a88
-
SHA256
0c744a4f4902b8c94b87fa579065e1fb2d5f6f2d27a6ebbdff6f3501e2e78c35
-
SHA512
f9eaccfa9f8815f285f4ad2183997f11ab4c3a17c319b18df0a0ca6153c66a24d0dd99e90c996bbf2244e6bb875c78a4a2aaa0e64e92e7a42aa5962a659d8192
-
SSDEEP
196608:i4eQZYLJnBg4D2R+Nk3RbBzs/6hkP8S9qRZKzPWz2X2+twU2HfyjLfazM0+WsDRD:3ZYRDxk3RtgOkPJyZcXJz2/6LizmzVHH
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Server.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 7 IoCs
pid Process 3944 Server.exe 2036 Onetap (1).exe 4756 ._cache_Server.exe 392 Synaptics.exe 1128 svchost.exe 4732 ._cache_Synaptics.exe 4220 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Server.exe -
Creates a Windows Service
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2036 Onetap (1).exe -
resource yara_rule behavioral2/files/0x000a000000023b54-17.dat upx behavioral2/memory/2036-162-0x0000000140000000-0x000000014124B000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe ._cache_Server.exe File opened for modification C:\Windows\svchost.exe ._cache_Server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2036 Onetap (1).exe 2036 Onetap (1).exe 2036 Onetap (1).exe 2036 Onetap (1).exe 2036 Onetap (1).exe 2036 Onetap (1).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2036 Onetap (1).exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 208 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 208 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 4756 ._cache_Server.exe 1128 svchost.exe 4732 ._cache_Synaptics.exe 4220 svchost.exe 4220 svchost.exe 2036 Onetap (1).exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 208 wrote to memory of 3944 208 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 83 PID 208 wrote to memory of 3944 208 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 83 PID 208 wrote to memory of 3944 208 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 83 PID 208 wrote to memory of 2036 208 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 84 PID 208 wrote to memory of 2036 208 2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe 84 PID 3944 wrote to memory of 4756 3944 Server.exe 85 PID 3944 wrote to memory of 4756 3944 Server.exe 85 PID 3944 wrote to memory of 4756 3944 Server.exe 85 PID 3944 wrote to memory of 392 3944 Server.exe 86 PID 3944 wrote to memory of 392 3944 Server.exe 86 PID 3944 wrote to memory of 392 3944 Server.exe 86 PID 392 wrote to memory of 4732 392 Synaptics.exe 88 PID 392 wrote to memory of 4732 392 Synaptics.exe 88 PID 392 wrote to memory of 4732 392 Synaptics.exe 88 PID 1128 wrote to memory of 4220 1128 svchost.exe 89 PID 1128 wrote to memory of 4220 1128 svchost.exe 89 PID 1128 wrote to memory of 4220 1128 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-03_85d2c8e0e00f4750107bac6f6b0b3445_icedid.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Roaming\Server.exe"C:\Users\Admin\AppData\Roaming\Server.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\._cache_Server.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Server.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4756
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4732
-
-
-
-
C:\Users\Admin\AppData\Roaming\Onetap (1).exe"C:\Users\Admin\AppData\Roaming\Onetap (1).exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\svchost.exeC:\Windows\svchost.exe Win72⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD5a857b537e8649f06ef10a9960fbfb137
SHA1a4e5e981e485d7eff80a60273e980e1dd55c1211
SHA25627e5eae57a9eb81305e03e9c29692f605569e50203ea9bb428c86bc57fca11ca
SHA512cb8d47037cb61432de00132bdda7dd8722db65a2f66384613b8ef9ad5e4f33090131aca2d88b0d72328d4f737f55799dcaa1cc93986cf8621fb781da26ed6dbc
-
Filesize
9.1MB
MD57309886b94ed89dbf84e663891b210aa
SHA164639fcc149630306e91523428f3e35b5fa38d1f
SHA256aead45444baba74dfbf623c46189e9fd6b29c07839cb2e0ed414138bdf84c1cf
SHA512d65339e0b5590a4b17d185a53596fad09762b1d6b7b633bc1469e3a2131350caab6e9e0739da5e830d7069861aa6308e5db11c13b4be6bd42ce95164bec49e0a
-
Filesize
1.1MB
MD55ef868a2db9378a57d854c6c1f6257ad
SHA1a7eb959eae127311d466adb45be4983ed1dc03da
SHA2566b8f8725c13cf835a72b49583cd139c5e801ffc5983efbec1dbdb198d5dd55c9
SHA512cd4e4c6604a653b0e8646659c578c0f2c59c0669c7a7fedafc283ca18b112057da443e37dff9f8eee14b715917f1fa4a195fffd790900a35121b0ea87643ae2d