Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2023, 20:06

General

  • Target

    789da84befd5f215dcf78aa7ee250663_icedid_JC.exe

  • Size

    262KB

  • MD5

    789da84befd5f215dcf78aa7ee250663

  • SHA1

    ccb87115463129fb983aa07a02154c9ee17045f3

  • SHA256

    1232f5eb301ba4b45fd69c0578cf86558a98aa6250253285bf73da039722d930

  • SHA512

    11777c95e07d284814e8a76b638cfcebd569d0fb7119c731680b2acad62ee6e60911c6f0e3cfc17bb0b8ceede292b834724bc598654a44e5dd63b7c0dd03c037

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\789da84befd5f215dcf78aa7ee250663_icedid_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\789da84befd5f215dcf78aa7ee250663_icedid_JC.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Program Files\Debugging\Internals.exe
      "C:\Program Files\Debugging\Internals.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Debugging\Internals.exe

    Filesize

    263KB

    MD5

    af7345ae7e015c7d42be26ce89cbfd0d

    SHA1

    250e4d83338e60ee58fef0e6e82bc83b68c2207b

    SHA256

    c640146e036b7f683c99fbe16603028251cb2a14b69a3405005d86e4adc8653d

    SHA512

    7e291db944b5833ee31e3b8efb23fc3557536c10f762183d84d8b650b9df1f158221bb8849dbb3ed6ba60ec4c871dafbe71c2804ea50b473e84c1b2d77b2017d

  • C:\Program Files\Debugging\Internals.exe

    Filesize

    263KB

    MD5

    af7345ae7e015c7d42be26ce89cbfd0d

    SHA1

    250e4d83338e60ee58fef0e6e82bc83b68c2207b

    SHA256

    c640146e036b7f683c99fbe16603028251cb2a14b69a3405005d86e4adc8653d

    SHA512

    7e291db944b5833ee31e3b8efb23fc3557536c10f762183d84d8b650b9df1f158221bb8849dbb3ed6ba60ec4c871dafbe71c2804ea50b473e84c1b2d77b2017d

  • \Program Files\Debugging\Internals.exe

    Filesize

    263KB

    MD5

    af7345ae7e015c7d42be26ce89cbfd0d

    SHA1

    250e4d83338e60ee58fef0e6e82bc83b68c2207b

    SHA256

    c640146e036b7f683c99fbe16603028251cb2a14b69a3405005d86e4adc8653d

    SHA512

    7e291db944b5833ee31e3b8efb23fc3557536c10f762183d84d8b650b9df1f158221bb8849dbb3ed6ba60ec4c871dafbe71c2804ea50b473e84c1b2d77b2017d

  • \Program Files\Debugging\Internals.exe

    Filesize

    263KB

    MD5

    af7345ae7e015c7d42be26ce89cbfd0d

    SHA1

    250e4d83338e60ee58fef0e6e82bc83b68c2207b

    SHA256

    c640146e036b7f683c99fbe16603028251cb2a14b69a3405005d86e4adc8653d

    SHA512

    7e291db944b5833ee31e3b8efb23fc3557536c10f762183d84d8b650b9df1f158221bb8849dbb3ed6ba60ec4c871dafbe71c2804ea50b473e84c1b2d77b2017d