Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe
-
Size
415KB
-
MD5
a2a41d32d7046627a140c2dc32e9e17c
-
SHA1
15d7255131850848b2d2f30a15b21cdfc1b56b4d
-
SHA256
3dd6c19d466ef87bea2fb4665f83e51ce9a3bf340fd0fd20ed3c947dec9a87cf
-
SHA512
7d75f013679e892a26f8e8f8ed1ad96cf3e636b77e4524bdd515c325f92a961f8927a90ab8ba4044f143ba7a311f16179811c96cf9afc7772859854832d75800
-
SSDEEP
12288:UplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:QxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3012 runtime.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\compact\runtime.exe 2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1644 2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe 1644 2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe 1644 2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe 1644 2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe 3012 runtime.exe 3012 runtime.exe 3012 runtime.exe 3012 runtime.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1644 wrote to memory of 3012 1644 2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe 86 PID 1644 wrote to memory of 3012 1644 2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe 86 PID 1644 wrote to memory of 3012 1644 2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_a2a41d32d7046627a140c2dc32e9e17c_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files\compact\runtime.exe"C:\Program Files\compact\runtime.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
416KB
MD503966cfdfd13966d09e143b40afae68c
SHA139b7b9b68ca7b66695ccc3becfdc798b7cccfed8
SHA256194308f04b7c0946a2e2c1fbbe41fdbd2bb95481bd340de460023b82910942a2
SHA512a71fd4fbeb8c1f8fa2aa47340aa5748fde3d2c271eaf7590d383a1c6e096941f589000a6b2c26f597b8e73351f148fe1bc50b3b37698bf5dd70bfc2dd3f29f98