Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2023, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
789da84befd5f215dcf78aa7ee250663_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
789da84befd5f215dcf78aa7ee250663_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
789da84befd5f215dcf78aa7ee250663_icedid_JC.exe
-
Size
262KB
-
MD5
789da84befd5f215dcf78aa7ee250663
-
SHA1
ccb87115463129fb983aa07a02154c9ee17045f3
-
SHA256
1232f5eb301ba4b45fd69c0578cf86558a98aa6250253285bf73da039722d930
-
SHA512
11777c95e07d284814e8a76b638cfcebd569d0fb7119c731680b2acad62ee6e60911c6f0e3cfc17bb0b8ceede292b834724bc598654a44e5dd63b7c0dd03c037
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2640 privileges.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Internals\privileges.exe 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe File opened for modification C:\Program Files\Internals\privileges.exe 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1436 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 1436 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 1436 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 1436 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 2640 privileges.exe 2640 privileges.exe 2640 privileges.exe 2640 privileges.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1436 wrote to memory of 2640 1436 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 81 PID 1436 wrote to memory of 2640 1436 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 81 PID 1436 wrote to memory of 2640 1436 789da84befd5f215dcf78aa7ee250663_icedid_JC.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\789da84befd5f215dcf78aa7ee250663_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\789da84befd5f215dcf78aa7ee250663_icedid_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files\Internals\privileges.exe"C:\Program Files\Internals\privileges.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5dfd49686c2042e80310dbaadca1e9bc3
SHA158a80399fd596819fc7b8068cc132892499a1a25
SHA256d74d30bd462e76f7ab4e5a3df8567b8c764d07275aa13b90642ebb02a47db5b6
SHA512bdbaa9f0c6d5d73fb00cfcd123ad184e4ce67ee10a1dc1c3f94d3a0be078a5e28b5afa2b0c7ded8c695e0fe80fd0fbf94428e40d96db57d04e12213eecb014c9
-
Filesize
263KB
MD5dfd49686c2042e80310dbaadca1e9bc3
SHA158a80399fd596819fc7b8068cc132892499a1a25
SHA256d74d30bd462e76f7ab4e5a3df8567b8c764d07275aa13b90642ebb02a47db5b6
SHA512bdbaa9f0c6d5d73fb00cfcd123ad184e4ce67ee10a1dc1c3f94d3a0be078a5e28b5afa2b0c7ded8c695e0fe80fd0fbf94428e40d96db57d04e12213eecb014c9