Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe
-
Size
311KB
-
MD5
8e21b1edab89d557139cbe7e8bba217f
-
SHA1
6858e913f167519dce02ad55dd622829a60ee311
-
SHA256
5cfc6edb40f3265976da6497bb295e5b55d252df4c9a1594a8a2eff59ec33e96
-
SHA512
7bc587fcc0c40b7bc16a1884b6f181d7a5047bfb65536c1482e884df37774429cdf35def7e81671bbafe9a4764d8416cb234176429a93263eb3d009a9edbadca
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5068 Dsetup2.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Dsetup1\Dsetup2.exe 2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe File created C:\Program Files\Dsetup1\Dsetup2.exe 2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4528 2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe 4528 2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe 4528 2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe 4528 2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe 5068 Dsetup2.exe 5068 Dsetup2.exe 5068 Dsetup2.exe 5068 Dsetup2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 5068 4528 2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe 84 PID 4528 wrote to memory of 5068 4528 2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe 84 PID 4528 wrote to memory of 5068 4528 2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_8e21b1edab89d557139cbe7e8bba217f_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files\Dsetup1\Dsetup2.exe"C:\Program Files\Dsetup1\Dsetup2.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
311KB
MD504ba14d7ceb1876b761ebc53dff3a70f
SHA1ad0a85b149ead53da556696bee5f3f80c8ba2c7e
SHA25666211a1bf3d2002b40c35b35160dd5bb0fe59afdbc03cc8591b9e08498f93f01
SHA512b3e9e918792c9cb0e23d7d4dd639ca3778975dd213546cd9654eaa0c79954c9e7cd5637421196334bb72e75c3eda01079bf837b8b367d2d46b485a294cbe0d2a