Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe
-
Size
306KB
-
MD5
8c9ae892e80594e2a2ba96e5b70b7b33
-
SHA1
6f34562de2086b6d3f0eaa4c14bd02ac7a19dbda
-
SHA256
a29f69bd55a5c393664b04b5617ec88cbfbfca23b967200002ae4915ed12e6c6
-
SHA512
a27b2ce588eac1b36746b872c156dca5ead3ab9534cb8a3707dfc4dd6d81580c132f94981f632b47802563e77d28d1ef21648004cc7d52cb3f804ad56cde5b87
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1764 MessageBox.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\obtains\MessageBox.exe 2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe File opened for modification C:\Program Files\obtains\MessageBox.exe 2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1996 2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe 1996 2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe 1996 2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe 1996 2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe 1764 MessageBox.exe 1764 MessageBox.exe 1764 MessageBox.exe 1764 MessageBox.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1764 1996 2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe 89 PID 1996 wrote to memory of 1764 1996 2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe 89 PID 1996 wrote to memory of 1764 1996 2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_8c9ae892e80594e2a2ba96e5b70b7b33_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\obtains\MessageBox.exe"C:\Program Files\obtains\MessageBox.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD56d77cbb61e9b66394f8ee703c1cf00f4
SHA1c92453674f79eb4e3419ad944ba442bd0ac503c3
SHA256d398a7b3df324528a3fa5ac1956cf5c058bb9972335277344f4cc43c0626e06c
SHA512e6b5eb07baeced1502279ee5e8d2bbe2c40ae81ac5e17c47f95bd7ee74fbac5afe3bc939ffec8f5d95e08b3987b939cdb7c4a4f8494915f2eb71d5823c08faa7