Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe
-
Size
311KB
-
MD5
5c1ddcd8c735fba53ad912388516b877
-
SHA1
1e2263688fd7e6827a313a6f12a549710c862d05
-
SHA256
25c93e9513eec385b56409c2a2c557449897fc4edaf5f2e0f6ee1dd7f702a768
-
SHA512
142af95770562f914c70e94932950014be5a642b01820cc538f9c6387a341457d2bc9fb831e971f82d3d8409ac706c4eef307c64f1ec6ed2961e5262e53d2914
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2868 Applications.exe -
Loads dropped DLL 2 IoCs
pid Process 2316 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe 2316 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\DirectSetup\Applications.exe 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe File opened for modification C:\Program Files\DirectSetup\Applications.exe 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2316 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe 2316 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe 2316 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe 2316 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe 2868 Applications.exe 2868 Applications.exe 2868 Applications.exe 2868 Applications.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2868 2316 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe 28 PID 2316 wrote to memory of 2868 2316 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe 28 PID 2316 wrote to memory of 2868 2316 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe 28 PID 2316 wrote to memory of 2868 2316 2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_5c1ddcd8c735fba53ad912388516b877_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\DirectSetup\Applications.exe"C:\Program Files\DirectSetup\Applications.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
311KB
MD590bed5e598cb3fe6148a775c93681f4a
SHA1ea9ae5dcee018eaddd97e69e2963a8399f6c66f8
SHA256e28a1d2f7d460088a78220cfde7e4ac3a058d83e059e39e374df92cd731e5062
SHA5125edb428673b580025c32dd680cb98bd253fdd21468dcd1cf0fb97b66c8d1016fa4c0fadca8192e8200514219be023682ab2957ac2b000b1d4aaa3b2d2a741211