Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe
-
Size
424KB
-
MD5
96f2c1b8519c2594da431a541ff28f6b
-
SHA1
f6ab7f5a7a55a020c9a80e97f1d3286c59502979
-
SHA256
a16db50032b68f334aab03cb2e27db33a489d7c3594c59dee16a1b4dd5bd4323
-
SHA512
bf43e874d7d0f7b96db7e909c3e78133064541cabcca456827f9b7241452033cfa15f133725ec00c1fff5d55d7f746ce2d18fcbb67acd3d9efa50ad93ae31aac
-
SSDEEP
12288:JplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:LxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3580 make.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\application\make.exe 2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1580 2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe 1580 2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe 1580 2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe 1580 2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe 3580 make.exe 3580 make.exe 3580 make.exe 3580 make.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1580 wrote to memory of 3580 1580 2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe 87 PID 1580 wrote to memory of 3580 1580 2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe 87 PID 1580 wrote to memory of 3580 1580 2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_96f2c1b8519c2594da431a541ff28f6b_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\application\make.exe"C:\Program Files\application\make.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD52f94e1666afa3fa1249d2bcfc1f58f98
SHA100c134b7b14775751457cfe546ec9c2e4e9b57f0
SHA256e5e17ef05e1f083cd77b7a2fb4e9cc8b5d9e8c264caf292de98c679b63ed4633
SHA512de5fc4c92b4058d823341f350cbc2e4a1f6410e5d9f2fbd24db27bbf489ff4a55254dba176b86fbc80447f2061ebf609d6d2cb98a21a255f91fb9b39bdd5f23e