Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe
-
Size
427KB
-
MD5
c41e6f41dfc55d18a1ae7d66c94dbe70
-
SHA1
7ef177d2f5710a171e4f4330a00b9f0b24a9198d
-
SHA256
8c89fe10350b93b65d596faf7648f2105e4745b49cd0e2102f55699a17ce9dc9
-
SHA512
cc2d06898ada7d760c048caf41ce6ba0b6c67c59f32f5558b7afc9a1ac15107da7cda9d9b48d893b137962df0a26cda23cab9f4f753b06c42c279ec5add9d267
-
SSDEEP
12288:/plrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:RxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1612 entirely.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\declaration\entirely.exe 2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2532 2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe 2532 2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe 2532 2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe 2532 2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe 1612 entirely.exe 1612 entirely.exe 1612 entirely.exe 1612 entirely.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1612 2532 2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe 87 PID 2532 wrote to memory of 1612 2532 2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe 87 PID 2532 wrote to memory of 1612 2532 2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_c41e6f41dfc55d18a1ae7d66c94dbe70_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files\declaration\entirely.exe"C:\Program Files\declaration\entirely.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
428KB
MD5249082233076ffb4176edd3c3ded6cce
SHA1457e63cc9265e2bfb236261ded389b85e7272860
SHA2561be315ec37438009f98fcfe209a022ee5e00607987e13775f0c157a6f14f6ceb
SHA512d61c33a2b50e772cbf2b309568171776a2a2f1cb922c851fdab77904f2020c6d13fb509f2f67b67163941d88ddb52e850770aeac024adade7baaad4b38d561f6