Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_37544f8ac5024f930c1c1219673fd9a1_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_37544f8ac5024f930c1c1219673fd9a1_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_37544f8ac5024f930c1c1219673fd9a1_icedid_JC.exe
-
Size
450KB
-
MD5
37544f8ac5024f930c1c1219673fd9a1
-
SHA1
5cf5f62612911df02897da81c2bd274bb90919d0
-
SHA256
40055cc87c9a857e7497e1e00a617292b6237cd964e27cfd7a3e7da2a40dff56
-
SHA512
10df24e5c9ed8ee2b68da0999eff8d3069aa496eb6957b4e563ba8874f7a9fc79078dd63ec40c075025248d9fee8da41a7f4a00f1a684bec689ce41b42d26444
-
SSDEEP
6144:HXrLMJagzLISLsbP+ozL9rOMW9sqEhAChE+o2pFN9guGudPko+kVprI4:31SLsb+o9IGqEhAChE+zH9guGuNykV5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3968 rundl123.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\154.213.70.128:8553 rundl123.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4952 2023-08-26_37544f8ac5024f930c1c1219673fd9a1_icedid_JC.exe 4952 2023-08-26_37544f8ac5024f930c1c1219673fd9a1_icedid_JC.exe 3968 rundl123.exe 3968 rundl123.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3968 4952 2023-08-26_37544f8ac5024f930c1c1219673fd9a1_icedid_JC.exe 86 PID 4952 wrote to memory of 3968 4952 2023-08-26_37544f8ac5024f930c1c1219673fd9a1_icedid_JC.exe 86 PID 4952 wrote to memory of 3968 4952 2023-08-26_37544f8ac5024f930c1c1219673fd9a1_icedid_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_37544f8ac5024f930c1c1219673fd9a1_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_37544f8ac5024f930c1c1219673fd9a1_icedid_JC.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\ProgramData\rundl123.exe"c:\ProgramData\rundl123.exe"2⤵
- Executes dropped EXE
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:3968
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD537544f8ac5024f930c1c1219673fd9a1
SHA15cf5f62612911df02897da81c2bd274bb90919d0
SHA25640055cc87c9a857e7497e1e00a617292b6237cd964e27cfd7a3e7da2a40dff56
SHA51210df24e5c9ed8ee2b68da0999eff8d3069aa496eb6957b4e563ba8874f7a9fc79078dd63ec40c075025248d9fee8da41a7f4a00f1a684bec689ce41b42d26444
-
Filesize
450KB
MD537544f8ac5024f930c1c1219673fd9a1
SHA15cf5f62612911df02897da81c2bd274bb90919d0
SHA25640055cc87c9a857e7497e1e00a617292b6237cd964e27cfd7a3e7da2a40dff56
SHA51210df24e5c9ed8ee2b68da0999eff8d3069aa496eb6957b4e563ba8874f7a9fc79078dd63ec40c075025248d9fee8da41a7f4a00f1a684bec689ce41b42d26444