Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe
-
Size
312KB
-
MD5
7a4aef81ee44d2466988bb3de96334f0
-
SHA1
75f65724e74c03622bca13628d7edfe6a5eef875
-
SHA256
5b12781e7b844eeee1a44a4cb02d92d5ef3c0c4b0cdbaf9b8724365154fc41b8
-
SHA512
b6761177d47a11d043ecef53fdfc636b28ca5c7506ab7f12aa77eddda3616f71fb0006cc2f908b190401b11f5ab1f4e91e768bb180dfa2ab0007577a000b2dc2
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4140 customizing.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\callback\customizing.exe 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe File opened for modification C:\Program Files\callback\customizing.exe 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4740 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 4740 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 4740 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 4740 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 4140 customizing.exe 4140 customizing.exe 4140 customizing.exe 4140 customizing.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4140 4740 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 85 PID 4740 wrote to memory of 4140 4740 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 85 PID 4740 wrote to memory of 4140 4740 2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-11_7a4aef81ee44d2466988bb3de96334f0_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files\callback\customizing.exe"C:\Program Files\callback\customizing.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4140
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5932bfc0962092e728ea1a56c82061bef
SHA1b443d89bb7cb704d4f8adbab5d246cb463a23d89
SHA2568b9e92ab07d62e9d9ea93b9959d7f5c36d1336c531ef3e14a87661b8666d171a
SHA5129b4234db50abf7651150de5f4726dc4a608bdcccddd21242ca0c67a6dac70a9964879aa9a8628a0ffc020afbe5cbf3e0009f6b32805b58c733be22f57eea92a7