Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe
-
Size
422KB
-
MD5
8882e76796478a0c31f1f243c6f394f0
-
SHA1
27858288f9e827512e66b4cc5e24b721329e1580
-
SHA256
4fc91a4975c3c9363757db29a17e45f02014820c940351691152640bb0819c76
-
SHA512
ee39df00200a6f70e802e8b29eb6d16c9a6fdb9f1860150d043417c9cd554d3f712efb53ce517191fbc552cef44c9e587b304e08230d9883dbb1d367203df470
-
SSDEEP
12288:BplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:TxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3632 findout.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\waysto\findout.exe 2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 744 2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe 744 2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe 744 2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe 744 2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe 3632 findout.exe 3632 findout.exe 3632 findout.exe 3632 findout.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 744 wrote to memory of 3632 744 2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe 85 PID 744 wrote to memory of 3632 744 2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe 85 PID 744 wrote to memory of 3632 744 2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_8882e76796478a0c31f1f243c6f394f0_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files\waysto\findout.exe"C:\Program Files\waysto\findout.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3632
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422KB
MD51c8c76b78e1a39afef4ccd45bce12e69
SHA1a1402f8dbf2f70150fbca6397a3813f8eb93e2d3
SHA256a382936e08fb0a61791359b5d50138c06b710ce51973dff107d051d2c7848f17
SHA51208d1116f3642d03c46c639e8e33ade9a9130cb1e25265a068fc025de85d8a0e4c181519ad25e5e49cf2d72bb172b856aa1158934cf06220652f9c2469fc41176