Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe
-
Size
307KB
-
MD5
2ba718392c10e4c2a70bff30183731bc
-
SHA1
96ad0e303cce12e84b2881ec3d0d9c6d7bc216f6
-
SHA256
eca6a494b8fb08b83c773eb4c2eb9ce567e08d26bf7a8014d46490a0edbf60e4
-
SHA512
2196e9b5ba96ff954afc7544f0978b38ef85d3c2604a13fc4132a6becc34b82dba27aec17f9feb26508bf8b3255c4d53b72a50d026926c974b2cefcf2343c306
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1404 Sample.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe 1996 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\GetDXVer\Sample.exe 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe File opened for modification C:\Program Files\GetDXVer\Sample.exe 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1996 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe 1996 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe 1996 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe 1996 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe 1404 Sample.exe 1404 Sample.exe 1404 Sample.exe 1404 Sample.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1404 1996 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe 28 PID 1996 wrote to memory of 1404 1996 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe 28 PID 1996 wrote to memory of 1404 1996 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe 28 PID 1996 wrote to memory of 1404 1996 2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_2ba718392c10e4c2a70bff30183731bc_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\GetDXVer\Sample.exe"C:\Program Files\GetDXVer\Sample.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5e9cf5e96046a676a2b6a54b5234e9202
SHA1528bad69fc63fd95ac6c67b6b009dfaa184190dc
SHA256d50919384b75ffdbaf09576d14c97c120d6f70d4d4f2fcc9e788342ee19dc118
SHA512ac81b83f100ae30737b625cdd1a7648d97f89aed9b62c334728be3670254b67a853a163301e286061a2f805377a4932cccfd6b03f9089b3e5011783808192343