Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe
-
Size
369KB
-
MD5
4f41a7efc0d8d5836c9131487b0960e7
-
SHA1
0281216f915641ce9fb0cdbcd2459e094c2126fb
-
SHA256
72c06da541d585722a9aca1ae64bb87faa2d392782383a3f58f9a292ba4df28b
-
SHA512
94296fee4284b62b85e7f9c86bbc1fa4de634496c2b97c788d41c8fcfb7504b6ee304cfeda2a8f23aff49ff19f2c0d11434c37f423352ce34fb3b940bf7c60ea
-
SSDEEP
6144:GplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:GplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3356 upgrade.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\errors\upgrade.exe 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3468 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 3468 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 3468 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 3468 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 3356 upgrade.exe 3356 upgrade.exe 3356 upgrade.exe 3356 upgrade.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3468 wrote to memory of 3356 3468 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 81 PID 3468 wrote to memory of 3356 3468 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 81 PID 3468 wrote to memory of 3356 3468 4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\4f41a7efc0d8d5836c9131487b0960e7_icedid_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files\errors\upgrade.exe"C:\Program Files\errors\upgrade.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3356
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD5a159a691afbcd708c5bba1539f701dbd
SHA167d324c9733cedc3408d1dbd183ebce5c53b3d3e
SHA256dadb8260c58af119cd5e125a04873a0076950b132b9eb73a3889ec577d02567a
SHA512a0db1c105f9f6e4a01cc998c98aad56693f8c4c94a50dafc2ff943689aac24e72c1d4433f390719d5b6f82dec27c286da43fb7b54f9dd23cdadd5cf798d4b217
-
Filesize
369KB
MD5a159a691afbcd708c5bba1539f701dbd
SHA167d324c9733cedc3408d1dbd183ebce5c53b3d3e
SHA256dadb8260c58af119cd5e125a04873a0076950b132b9eb73a3889ec577d02567a
SHA512a0db1c105f9f6e4a01cc998c98aad56693f8c4c94a50dafc2ff943689aac24e72c1d4433f390719d5b6f82dec27c286da43fb7b54f9dd23cdadd5cf798d4b217