Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe
-
Size
381KB
-
MD5
7ce7a37b1fbc0d442be828198f3d9d7d
-
SHA1
699a42ef78e2fc9d857279cb999ae1a42ddb8cf1
-
SHA256
d895a44531d0593ba3f83858e3c2fd58b497eb5a695c5f419ac7cb0ff8b95e89
-
SHA512
1a3d53d0ad171225e903b3fef6138171fa890fd409fa675a860f95e80a1aaaa4f2e6a1f6e5320700a614d7f45c1de8958493d94a4e36844c02dcf0a203886244
-
SSDEEP
6144:GplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:GplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 component.exe -
Loads dropped DLL 2 IoCs
pid Process 3044 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe 3044 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\customer\component.exe 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3044 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe 3044 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe 3044 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe 3044 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe 1704 component.exe 1704 component.exe 1704 component.exe 1704 component.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1704 3044 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe 28 PID 3044 wrote to memory of 1704 3044 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe 28 PID 3044 wrote to memory of 1704 3044 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe 28 PID 3044 wrote to memory of 1704 3044 2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_7ce7a37b1fbc0d442be828198f3d9d7d_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files\customer\component.exe"C:\Program Files\customer\component.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5b7ce84e4566ee09d80cdd367bb647e1e
SHA123a4b269aa93c5e74812f52f94c356108c031d0d
SHA256d068c7fc12157ea08e8314e34e9f775b44a67fe4028ff7a5c860bd8ca001e8e7
SHA5124afeee85448051aedeaed7b370a4c75190feae3045e17072a7d60a0a85f36d5eb8d28b0de48c06afab037261b880381d6354f95b556610800e30b71752fbfb96