Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 06:15 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe
-
Size
428KB
-
MD5
faaf126f546f3a4c3030f9396047df39
-
SHA1
72234bc7c052a2db2e0b110edaf629f66b755257
-
SHA256
043f4890ac896623837106dc5403d4969943a6048634b6aa6a6075b3c3ec5989
-
SHA512
b91e0a38c15f30396f994c0f24285cc1d7b6ec2c28c81647ffbbba13c19550808f19d00789cf1b7eda2d86de462404afd0d8cb53ec0224aae829535304a20193
-
SSDEEP
12288:DplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:FxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2444 upgrade.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\errors\upgrade.exe 2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1132 2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe 1132 2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe 1132 2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe 1132 2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe 2444 upgrade.exe 2444 upgrade.exe 2444 upgrade.exe 2444 upgrade.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1132 wrote to memory of 2444 1132 2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe 84 PID 1132 wrote to memory of 2444 1132 2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe 84 PID 1132 wrote to memory of 2444 1132 2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_faaf126f546f3a4c3030f9396047df39_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files\errors\upgrade.exe"C:\Program Files\errors\upgrade.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request28.118.140.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request180.178.17.96.in-addr.arpaIN PTRResponse180.178.17.96.in-addr.arpaIN PTRa96-17-178-180deploystaticakamaitechnologiescom
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
28.118.140.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
21.236.111.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
180.178.17.96.in-addr.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD563d931686df5de5f9ad818685aece945
SHA19d9dd7beb4710793516dbdd3f7678f23da6ea342
SHA2568076d255184258043d235f36cbb65bcfdd35351e15a77d6719e9f88c94e6a775
SHA51213b81a082a85917aaa03d75779ec877ade8ce41a77259725edf18ab33515350118a923cdb55c7f715560c48c55e3998406acaabbfbe67fc2ff8d51aed4279068