Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
81s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe
-
Size
312KB
-
MD5
9afbe87918bcfac56fe5b92c3bc84131
-
SHA1
2c40e3dbd4757ce268ccb06f5c1ea75692fba5a6
-
SHA256
3d64c89b1b263230c9a1ae42ab382680761321a6161f9ca3bf93ec0681fc6825
-
SHA512
b21baa0f0c2648d1ab2e66907b515a53cd3b73f119aed669eb9a0189fc868f05572a71bec9a69473c2ad4c12d0574b5c794e14b2fbd032894b8a83fed7bbfe17
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3952 Performs.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\silent\Performs.exe 2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe File opened for modification C:\Program Files\silent\Performs.exe 2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1784 2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe 1784 2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe 1784 2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe 1784 2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe 3952 Performs.exe 3952 Performs.exe 3952 Performs.exe 3952 Performs.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1784 wrote to memory of 3952 1784 2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe 86 PID 1784 wrote to memory of 3952 1784 2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe 86 PID 1784 wrote to memory of 3952 1784 2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_9afbe87918bcfac56fe5b92c3bc84131_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\silent\Performs.exe"C:\Program Files\silent\Performs.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3952
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5305355fc228ccbe200c385a7845cadab
SHA1c1efb70dc91e4e808378c70bc5edba251b9b77fd
SHA256625bdbeddbf2a0ba627a9b7277afc0500d5b45f5e194d90c135b24e9fcc59bd9
SHA512f3982bedb980a54d9fc375b790b4412659f9612441ef5332756ecd056f56c908f2db52102a35c283f597597ca17157fcf179e24aa57725f759acb3411e8a543a