Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe
-
Size
411KB
-
MD5
863482fa8948f948a21f65f7f09f23af
-
SHA1
3432286a809b1a28f9b4e0a9ce40e9a948cc43a5
-
SHA256
7773b454f53f72bb8f598aeb84e84bde068696d47ff8a9a9e876a70e5c30de92
-
SHA512
fcbc503a557152f8ee51febd283ece68123baa7c89c24d9fd76775d5dabf3fd4433b125955e78e734b1d80b1b5e7ad918a4b81124d117f6aa3b52d5459973636
-
SSDEEP
12288:splrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:4xRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3520 sure.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\make\sure.exe 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 388 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 388 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 388 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 388 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 3520 sure.exe 3520 sure.exe 3520 sure.exe 3520 sure.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 388 wrote to memory of 3520 388 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 86 PID 388 wrote to memory of 3520 388 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 86 PID 388 wrote to memory of 3520 388 2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_863482fa8948f948a21f65f7f09f23af_icedid_JC.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files\make\sure.exe"C:\Program Files\make\sure.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5cc9a9b595d804fe5fa1cd2ac971d3656
SHA1813fb42dd0ab4e3cbe44d968cf08194e222539fe
SHA25607b2e8a2cb0747714818c532296ef4d824491423fa13016c9ded515a6fc55873
SHA512c4348681cb40d0abd0a95ceef290ca921097e96898081936af7a5a4a4856035040c190fdd5f7a444d2b339314b79dcfdb95926ddd62ad811da436b93f791e422
-
Filesize
412KB
MD5cc9a9b595d804fe5fa1cd2ac971d3656
SHA1813fb42dd0ab4e3cbe44d968cf08194e222539fe
SHA25607b2e8a2cb0747714818c532296ef4d824491423fa13016c9ded515a6fc55873
SHA512c4348681cb40d0abd0a95ceef290ca921097e96898081936af7a5a4a4856035040c190fdd5f7a444d2b339314b79dcfdb95926ddd62ad811da436b93f791e422