Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe
-
Size
262KB
-
MD5
4bfe678ed45802d9b87dc34c6c7c5b53
-
SHA1
965413baa1da287e2e9ec548588dd0f4b9e44300
-
SHA256
72fe90a1b651522b77171696e9c8a43701f55247d3defe01ddef7a828ff64f00
-
SHA512
9c8a141d1eb80d9796dadd318484905f599adaf0009debca8d641347bbb572b2d3213243a901148f2403c70f0aa7ec6dcbe4b6cb0bea908d85bcc8205db35c8b
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4820 Education.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Inside\Education.exe 4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe File created C:\Program Files\Inside\Education.exe 4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4420 4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe 4420 4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe 4420 4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe 4420 4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe 4820 Education.exe 4820 Education.exe 4820 Education.exe 4820 Education.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 4820 4420 4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe 86 PID 4420 wrote to memory of 4820 4420 4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe 86 PID 4420 wrote to memory of 4820 4420 4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\4bfe678ed45802d9b87dc34c6c7c5b53_icedid_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files\Inside\Education.exe"C:\Program Files\Inside\Education.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4820
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD584265dccb8ae84e51a8b9c861d87425a
SHA129827e265043d7436c5827d40871af9f56f5aa09
SHA256a28ff935a5f70d424d683076dc1260a24902e8525743e29882434dfcb7083fe7
SHA5127136053f75505cd44ef8b20b45cace2489d8e6dc201d6cab3d83fd8d0ecb8b9cdd8687ed70917942eb695edcf2c9b8926b61b554df3597e6e905f5d4de32f17a
-
Filesize
262KB
MD584265dccb8ae84e51a8b9c861d87425a
SHA129827e265043d7436c5827d40871af9f56f5aa09
SHA256a28ff935a5f70d424d683076dc1260a24902e8525743e29882434dfcb7083fe7
SHA5127136053f75505cd44ef8b20b45cace2489d8e6dc201d6cab3d83fd8d0ecb8b9cdd8687ed70917942eb695edcf2c9b8926b61b554df3597e6e905f5d4de32f17a