Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe
-
Size
377KB
-
MD5
41d25a8bbc86e7d90de19fe06cdb5aaf
-
SHA1
828fc9b73fd65ad2a08915edde91d207281bb37a
-
SHA256
88edf2c3a58acd4d420e264571f9eaa3eb4ba1dea5809a863c39f15ed251c132
-
SHA512
7b56a3709fe94ca1fc584665b2e91c28cd17744a134061b3f48df4c6727e986549cb26a6dcfbaf254818c2cc445d1da8c14d98c8d0d52c131ddcf89b5394c143
-
SSDEEP
6144:PplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:PplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 880 installation.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Windows\installation.exe 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3868 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 3868 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 3868 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 3868 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 880 installation.exe 880 installation.exe 880 installation.exe 880 installation.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3868 wrote to memory of 880 3868 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 87 PID 3868 wrote to memory of 880 3868 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 87 PID 3868 wrote to memory of 880 3868 2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-22_41d25a8bbc86e7d90de19fe06cdb5aaf_icedid_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Program Files\Windows\installation.exe"C:\Program Files\Windows\installation.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:880
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD566a08292cc6cbceb2bb6e2c73ffd90ca
SHA164219c399aa6a34d0519b0b6cbf8042a05770d44
SHA256cf6dffc3d0cd18e6e2b43cd500dc68a2fabcf6e05729968e2182e3770d502abe
SHA512cafbc7d2ad86f16070a9906cd439fec875b8be10fff356dedfa77f54f0c939d149cdb0916f0370aa0a2201cd29d3a89d41e89c79fb324214c2b193d9aecca3cb
-
Filesize
377KB
MD566a08292cc6cbceb2bb6e2c73ffd90ca
SHA164219c399aa6a34d0519b0b6cbf8042a05770d44
SHA256cf6dffc3d0cd18e6e2b43cd500dc68a2fabcf6e05729968e2182e3770d502abe
SHA512cafbc7d2ad86f16070a9906cd439fec875b8be10fff356dedfa77f54f0c939d149cdb0916f0370aa0a2201cd29d3a89d41e89c79fb324214c2b193d9aecca3cb