Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 06:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe
-
Size
422KB
-
MD5
d58be91bbde28ba7c6550decb5e8ee79
-
SHA1
3f3712632018f46cd9e466fc396a492da287273a
-
SHA256
58cda29fe0675064e582f6788fcd93046cb3f2a560aeaf970f9ba49a0893273e
-
SHA512
7b4778f4a96791a16c3ec016fdf66979de24031dc18b07f59792e527481161ec70e64632b2850c6f5a2c98c1d8877043a57b43542e6f56304e21f8e5abce4671
-
SSDEEP
12288:yplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:+xRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2880 waysto.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Before\waysto.exe 2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2992 2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe 2992 2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe 2992 2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe 2992 2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe 2880 waysto.exe 2880 waysto.exe 2880 waysto.exe 2880 waysto.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2880 2992 2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe 93 PID 2992 wrote to memory of 2880 2992 2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe 93 PID 2992 wrote to memory of 2880 2992 2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_d58be91bbde28ba7c6550decb5e8ee79_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Before\waysto.exe"C:\Program Files\Before\waysto.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD557f192c52ec008f8e8511e5faa0210e0
SHA14ff3ac19b5ef6881ff82e0f634965b780bc062cd
SHA256c175fcaacd312b0714702fb831ef91809e834ca1db427c6a14db3cae4e886f8a
SHA512670044d836299f50d67b457a4b165a7fde26fed9027de097e0806828c1b91aacd7ad7fdd649c7cbb5efb618e985ed652379acc9793d2efe37011cee193256da5