Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05/08/2023, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
789da84befd5f215dcf78aa7ee250663_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
789da84befd5f215dcf78aa7ee250663_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
789da84befd5f215dcf78aa7ee250663_icedid_JC.exe
-
Size
262KB
-
MD5
789da84befd5f215dcf78aa7ee250663
-
SHA1
ccb87115463129fb983aa07a02154c9ee17045f3
-
SHA256
1232f5eb301ba4b45fd69c0578cf86558a98aa6250253285bf73da039722d930
-
SHA512
11777c95e07d284814e8a76b638cfcebd569d0fb7119c731680b2acad62ee6e60911c6f0e3cfc17bb0b8ceede292b834724bc598654a44e5dd63b7c0dd03c037
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1060 Internals.exe -
Loads dropped DLL 2 IoCs
pid Process 2592 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 2592 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Debugging\Internals.exe 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe File opened for modification C:\Program Files\Debugging\Internals.exe 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2592 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 2592 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 2592 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 2592 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 1060 Internals.exe 1060 Internals.exe 1060 Internals.exe 1060 Internals.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2592 wrote to memory of 1060 2592 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 28 PID 2592 wrote to memory of 1060 2592 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 28 PID 2592 wrote to memory of 1060 2592 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 28 PID 2592 wrote to memory of 1060 2592 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\789da84befd5f215dcf78aa7ee250663_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\789da84befd5f215dcf78aa7ee250663_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Debugging\Internals.exe"C:\Program Files\Debugging\Internals.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1060
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5af7345ae7e015c7d42be26ce89cbfd0d
SHA1250e4d83338e60ee58fef0e6e82bc83b68c2207b
SHA256c640146e036b7f683c99fbe16603028251cb2a14b69a3405005d86e4adc8653d
SHA5127e291db944b5833ee31e3b8efb23fc3557536c10f762183d84d8b650b9df1f158221bb8849dbb3ed6ba60ec4c871dafbe71c2804ea50b473e84c1b2d77b2017d
-
Filesize
263KB
MD5af7345ae7e015c7d42be26ce89cbfd0d
SHA1250e4d83338e60ee58fef0e6e82bc83b68c2207b
SHA256c640146e036b7f683c99fbe16603028251cb2a14b69a3405005d86e4adc8653d
SHA5127e291db944b5833ee31e3b8efb23fc3557536c10f762183d84d8b650b9df1f158221bb8849dbb3ed6ba60ec4c871dafbe71c2804ea50b473e84c1b2d77b2017d
-
Filesize
263KB
MD5af7345ae7e015c7d42be26ce89cbfd0d
SHA1250e4d83338e60ee58fef0e6e82bc83b68c2207b
SHA256c640146e036b7f683c99fbe16603028251cb2a14b69a3405005d86e4adc8653d
SHA5127e291db944b5833ee31e3b8efb23fc3557536c10f762183d84d8b650b9df1f158221bb8849dbb3ed6ba60ec4c871dafbe71c2804ea50b473e84c1b2d77b2017d
-
Filesize
263KB
MD5af7345ae7e015c7d42be26ce89cbfd0d
SHA1250e4d83338e60ee58fef0e6e82bc83b68c2207b
SHA256c640146e036b7f683c99fbe16603028251cb2a14b69a3405005d86e4adc8653d
SHA5127e291db944b5833ee31e3b8efb23fc3557536c10f762183d84d8b650b9df1f158221bb8849dbb3ed6ba60ec4c871dafbe71c2804ea50b473e84c1b2d77b2017d