Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
8s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe
-
Size
292KB
-
MD5
e32518aa1a89f1b16a668f4a05dd8664
-
SHA1
c604a2d9e73b45995fa33cc0666364d563afacda
-
SHA256
206be4f8005214e2d9c73156f38598b6cc9eb14c64d6951f11bae3351dd88bcc
-
SHA512
ad6b1949581244a9137024a0140f57e26f4a27de492ac7c3997aca5ec57147b1dbcbe19a28ec5b463a805475f7deb0f49831f759673b3ec71bbe362afdea30f2
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2276 MessageBox.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\obtains\MessageBox.exe 2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe File opened for modification C:\Program Files\obtains\MessageBox.exe 2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5244 2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe 5244 2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe 5244 2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe 5244 2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe 2276 MessageBox.exe 2276 MessageBox.exe 2276 MessageBox.exe 2276 MessageBox.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5244 wrote to memory of 2276 5244 2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe 20 PID 5244 wrote to memory of 2276 5244 2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe 20 PID 5244 wrote to memory of 2276 5244 2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_e32518aa1a89f1b16a668f4a05dd8664_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5244 -
C:\Program Files\obtains\MessageBox.exe"C:\Program Files\obtains\MessageBox.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD569d59cee037fa895858e00ff1b77a4f6
SHA1b55b52be0e970f33b833d8d9959f2d4f1e8da6ea
SHA256c9f6a85c33e25f6f6c551e42f9d7892e8d35126a91f10e9bec95434315a393ed
SHA512ec4380166f3c8261e9893355ff8ab3efdc6147d0ad3d8b09e23f42ce8b3a9ef72656a7e4e919faacf9a29a6dd0b4775c75452167767da75c260c897844b7094c