Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
01/08/2023, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
2a54e8655cf0628b4561eb329458d776_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2a54e8655cf0628b4561eb329458d776_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
2a54e8655cf0628b4561eb329458d776_icedid_JC.exe
-
Size
402KB
-
MD5
2a54e8655cf0628b4561eb329458d776
-
SHA1
d7fcabafa8ae18a0d17d88e84dda63712379aa1c
-
SHA256
a6273fb56214871946b1a00947b71d410a73c1498b6485e6deef6ebd17962bc4
-
SHA512
840f138b08333f01fe26d5aa0801bb4ef1149ab39f700a37d1ca7954844770fbf535b600440c320f9b35ebb865c4e275a8fd0cfd4720ec9776a1710d8663ceb5
-
SSDEEP
12288:oplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:UxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2112 Japanese.exe -
Loads dropped DLL 2 IoCs
pid Process 2640 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe 2640 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Italian\Japanese.exe 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2640 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe 2640 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe 2640 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe 2640 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe 2112 Japanese.exe 2112 Japanese.exe 2112 Japanese.exe 2112 Japanese.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2112 2640 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe 28 PID 2640 wrote to memory of 2112 2640 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe 28 PID 2640 wrote to memory of 2112 2640 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe 28 PID 2640 wrote to memory of 2112 2640 2a54e8655cf0628b4561eb329458d776_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a54e8655cf0628b4561eb329458d776_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2a54e8655cf0628b4561eb329458d776_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files\Italian\Japanese.exe"C:\Program Files\Italian\Japanese.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402KB
MD5e9029718d0ebb3196a4a8c6ffdbb57e8
SHA13316b84fd96b915756434cf6deae618ff4b07c58
SHA25609e3050e0ea6e468789f98437e7d25f4909acdd84bd8aaa8601f9e0e6e6bdc49
SHA512aa1c3c898a94ad0d44e5fcab5a1f431b579d3f3320dd0b62fef9b782d49acea0057e282533ab7f2f5c291f12c198b39d5c9772307340ce5fd91c866895b47737
-
Filesize
402KB
MD5e9029718d0ebb3196a4a8c6ffdbb57e8
SHA13316b84fd96b915756434cf6deae618ff4b07c58
SHA25609e3050e0ea6e468789f98437e7d25f4909acdd84bd8aaa8601f9e0e6e6bdc49
SHA512aa1c3c898a94ad0d44e5fcab5a1f431b579d3f3320dd0b62fef9b782d49acea0057e282533ab7f2f5c291f12c198b39d5c9772307340ce5fd91c866895b47737
-
Filesize
402KB
MD5e9029718d0ebb3196a4a8c6ffdbb57e8
SHA13316b84fd96b915756434cf6deae618ff4b07c58
SHA25609e3050e0ea6e468789f98437e7d25f4909acdd84bd8aaa8601f9e0e6e6bdc49
SHA512aa1c3c898a94ad0d44e5fcab5a1f431b579d3f3320dd0b62fef9b782d49acea0057e282533ab7f2f5c291f12c198b39d5c9772307340ce5fd91c866895b47737
-
Filesize
402KB
MD5e9029718d0ebb3196a4a8c6ffdbb57e8
SHA13316b84fd96b915756434cf6deae618ff4b07c58
SHA25609e3050e0ea6e468789f98437e7d25f4909acdd84bd8aaa8601f9e0e6e6bdc49
SHA512aa1c3c898a94ad0d44e5fcab5a1f431b579d3f3320dd0b62fef9b782d49acea0057e282533ab7f2f5c291f12c198b39d5c9772307340ce5fd91c866895b47737