Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe
-
Size
384KB
-
MD5
d18df05f411a69fc97083509feabe0ac
-
SHA1
0b7894eb166f3cd456209fc9623a09547cce366a
-
SHA256
3087fe8d9471b5a525008509c8023ac99f5544bdf1014b1ebe886b2a8028291f
-
SHA512
c3853437508d0e657664945db9d87294ccbdaa070c08e708bce3dc1b15881ae6c6b6f4891e10413f0ea7e439ce9098f14a47a21c672d1b6c7fe110b2e94293cf
-
SSDEEP
12288:QplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:sxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 directory.exe -
Loads dropped DLL 2 IoCs
pid Process 1936 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 1936 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\root\directory.exe 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1936 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 1936 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 1936 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 1936 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 1748 directory.exe 1748 directory.exe 1748 directory.exe 1748 directory.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1748 1936 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 28 PID 1936 wrote to memory of 1748 1936 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 28 PID 1936 wrote to memory of 1748 1936 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 28 PID 1936 wrote to memory of 1748 1936 2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_d18df05f411a69fc97083509feabe0ac_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files\root\directory.exe"C:\Program Files\root\directory.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD584609347adb3a9718b94b56ebcef35a2
SHA105dc5012b1dfcc38489a559d86b0fafcb4f851f6
SHA256e8c285887eb96dd11f406916179946ec09b9d78d3a3f1e8a9d2d4e6f9801d46e
SHA512068ab209cb27046ccb01546d0e81cc53fd3494d44614bd297698a919c49623f3efcf099a587c8931b67e784b002c77e0a5f34a07990102ffb63062f18a789bf5