Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/08/2023, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe
-
Size
372KB
-
MD5
6ebbe986e2c6086e4d7fd68ea2343fd6
-
SHA1
800af979fc0dd0dbb7d9f34d315bf6d7b49343a4
-
SHA256
a664afb02bbbbea237cf6254f3b641a7bd34caefd9463a330771c61c37457817
-
SHA512
16237810ae100df642a6849e94b0a404f024a532db62e079e38523118dc17af847f34d88b0ec138df117b4a7d1af9147ce69fd371e6c1dfe61abcef86ecf7970
-
SSDEEP
6144:OplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:OplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2276 approach.exe -
Loads dropped DLL 2 IoCs
pid Process 2784 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe 2784 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\silently\approach.exe 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2784 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe 2784 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe 2784 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe 2784 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe 2276 approach.exe 2276 approach.exe 2276 approach.exe 2276 approach.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2276 2784 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe 28 PID 2784 wrote to memory of 2276 2784 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe 28 PID 2784 wrote to memory of 2276 2784 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe 28 PID 2784 wrote to memory of 2276 2784 6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\6ebbe986e2c6086e4d7fd68ea2343fd6_icedid_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\silently\approach.exe"C:\Program Files\silently\approach.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5a0a0ea87ba64db0a609a87a11dded39b
SHA1f2f5124aec2e2fb8a175a1884a162ffc50af1809
SHA256d54871c03efa9f80b28d4c13036f2fe188de3274ca8f026575cf8f24e5672354
SHA51240217e8969af0e4380a37684e56167d2b4eae37f8d2cc062fe3ec604ebacde9f08ade15609d1eb4216aa31e924f29d32227d6b1742705461aae93952209e9810
-
Filesize
372KB
MD5a0a0ea87ba64db0a609a87a11dded39b
SHA1f2f5124aec2e2fb8a175a1884a162ffc50af1809
SHA256d54871c03efa9f80b28d4c13036f2fe188de3274ca8f026575cf8f24e5672354
SHA51240217e8969af0e4380a37684e56167d2b4eae37f8d2cc062fe3ec604ebacde9f08ade15609d1eb4216aa31e924f29d32227d6b1742705461aae93952209e9810
-
Filesize
372KB
MD5a0a0ea87ba64db0a609a87a11dded39b
SHA1f2f5124aec2e2fb8a175a1884a162ffc50af1809
SHA256d54871c03efa9f80b28d4c13036f2fe188de3274ca8f026575cf8f24e5672354
SHA51240217e8969af0e4380a37684e56167d2b4eae37f8d2cc062fe3ec604ebacde9f08ade15609d1eb4216aa31e924f29d32227d6b1742705461aae93952209e9810
-
Filesize
372KB
MD5a0a0ea87ba64db0a609a87a11dded39b
SHA1f2f5124aec2e2fb8a175a1884a162ffc50af1809
SHA256d54871c03efa9f80b28d4c13036f2fe188de3274ca8f026575cf8f24e5672354
SHA51240217e8969af0e4380a37684e56167d2b4eae37f8d2cc062fe3ec604ebacde9f08ade15609d1eb4216aa31e924f29d32227d6b1742705461aae93952209e9810