Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe
-
Size
314KB
-
MD5
293061b4100d9e806d53ea8b368e8389
-
SHA1
5697c815e449d77100cf05d63aff6eb36aee6882
-
SHA256
70d3ebd7bc41a256a5a25e08bea4614118ac71a9803cf169c8815c505a94861e
-
SHA512
c9648d19f11fcf9a5dcc6c46641e63ad1e95f39bfbfa94c7110dbca84b85c44f618c59938a78c1392ce1c68b99bcbd3edec49ae93e309d0a8613964d366d499a
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1948 Addison.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Schirmer\Addison.exe 2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe File opened for modification C:\Program Files\Schirmer\Addison.exe 2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3336 2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe 3336 2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe 3336 2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe 3336 2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe 1948 Addison.exe 1948 Addison.exe 1948 Addison.exe 1948 Addison.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3336 wrote to memory of 1948 3336 2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe 88 PID 3336 wrote to memory of 1948 3336 2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe 88 PID 3336 wrote to memory of 1948 3336 2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_293061b4100d9e806d53ea8b368e8389_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Program Files\Schirmer\Addison.exe"C:\Program Files\Schirmer\Addison.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1948
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD59547a860c7cd69e8866be6e62e4a834f
SHA1c856cbcb7cf77977c2845390cc7c5ea85d2cf56f
SHA256d679d7f3bd1c6b8d6983015952e04443086715cfb374ec200641b07648180d73
SHA5125e3c9372f5389636f66b13460d6140065fe6c5f24fa5ad73034b479ad26dacbb3695e134467f8b86768e6e6e37b2bdfd7dee1c14bfa3e02f9a6daa293b081041