Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe
-
Size
390KB
-
MD5
8b7af8708ef6dc8405b7e66c9d89697c
-
SHA1
e9226f4c2cba6707211c62d753ae0dbd51bf2652
-
SHA256
c662f5abd6f3524593df50859c1fec737af896f88fb9eb35afeee66d2e6de9d9
-
SHA512
125590b7758b83fc5d36a61bfbb69e68ef8b7a4669c32fa93168c9c8733effbb0f0e69f9050252e309e6ae5f1de5af2f3dd483ee7edd9899363f792152717eec
-
SSDEEP
12288:lplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:XxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1264 Czech.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Traditional\Czech.exe 2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4828 2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe 4828 2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe 4828 2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe 4828 2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe 1264 Czech.exe 1264 Czech.exe 1264 Czech.exe 1264 Czech.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4828 wrote to memory of 1264 4828 2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe 89 PID 4828 wrote to memory of 1264 4828 2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe 89 PID 4828 wrote to memory of 1264 4828 2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-03_8b7af8708ef6dc8405b7e66c9d89697c_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Program Files\Traditional\Czech.exe"C:\Program Files\Traditional\Czech.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1264
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD5b7b38b8b52ad3d52d4499a3f4346c5cf
SHA1e8dec05e563484bf56c1cd46b32fd36b55264668
SHA2560c97d6ea5d6dd20cdda988c14a572df7af56f60f62033b39feccc2cef53d249b
SHA5124520f0f393ad8629512403ab3295911aa25ed4a81a8cd0732779aa77f206fa63ef4a638384819a41eec694bf6102661b52c9c56a3727bfa1204ab6af83b00bf6