Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe
-
Size
428KB
-
MD5
df9599722a5eac4b1aaa590b15eabf1d
-
SHA1
b751557f0986a056386f04fecfcd3b45c1ab16a7
-
SHA256
a1e84cc0f1b61e3da6da86436c4d5d48c7321a5da0acfea991be698b53507407
-
SHA512
497364a38dc6906428fd2adcef44b1e86d17f77c0f53fb42bc148cbedc76e4aed90b01a91129fb88bd007337c27c56ae5c284eb148ecebf9b0c4b5096d4a58f3
-
SSDEEP
12288:QplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:sxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2252 structure.exe -
Loads dropped DLL 2 IoCs
pid Process 2052 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe 2052 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\proper\structure.exe 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2052 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe 2052 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe 2052 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe 2052 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe 2252 structure.exe 2252 structure.exe 2252 structure.exe 2252 structure.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2252 2052 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe 28 PID 2052 wrote to memory of 2252 2052 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe 28 PID 2052 wrote to memory of 2252 2052 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe 28 PID 2052 wrote to memory of 2252 2052 2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_df9599722a5eac4b1aaa590b15eabf1d_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files\proper\structure.exe"C:\Program Files\proper\structure.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD55140858c1a43ce6041ec7f715321399d
SHA13bbc4016c4ee31b5f7018bd434a1041430550630
SHA256bb52596dc78ff96d05f531381b3cbc9ca2cd6387ae849650bbc11c8894778010
SHA5128db674c918e629807cf95001c5e033a4c5bd46a9f6e24e48518cfe823576544fe29cb3cc9032481454242bb3d041a61a37965297afa2dfceb50998cfc2fedbd5