Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe
-
Size
382KB
-
MD5
ab618cf91eb66d0ebdc8b863ee8d0c52
-
SHA1
58934af6ca94b8c606c206db3797322408f0338b
-
SHA256
c4d87eb6fd232c7605d2d0462b82230f696526762e5cc4767668f2b074d9f545
-
SHA512
f65540c35eaeaacdacb8d6648570c7f3b6936170bf4632679c2e9aaaf2b135db6c4c884d46b128495569ef97e4b5aadfb17bc49747f43b670de2b6df1ccf0a7c
-
SSDEEP
6144:wplrlbbDdQaqd2X/96fr3KFEUGjr8uB2WgcA0cpXEVNrvGZ4FUqm6:wplrVbDdQaqdS/ofraFErH8uB2Wm0SXj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1916 dependant.exe -
Loads dropped DLL 2 IoCs
pid Process 2180 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe 2180 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\distribution\dependant.exe 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2180 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe 2180 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe 2180 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe 2180 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe 1916 dependant.exe 1916 dependant.exe 1916 dependant.exe 1916 dependant.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1916 2180 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe 28 PID 2180 wrote to memory of 1916 2180 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe 28 PID 2180 wrote to memory of 1916 2180 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe 28 PID 2180 wrote to memory of 1916 2180 2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_ab618cf91eb66d0ebdc8b863ee8d0c52_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files\distribution\dependant.exe"C:\Program Files\distribution\dependant.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD54c4b3feeb91d2a37ee3b0c302486b7a1
SHA19fbbc77a4f1a62f05829b8c6f6b358f0f51072e5
SHA2563159a14d739fac6be4a3c8d1b5b93f74e7402a4991c3f795137dec3d2d3091d7
SHA512c7cd33b19d00f982d6392c51fe170fa4ec4433360f6e03e6ad1a7ce6ce4e7d005702bc92ce1160cab91576f237d8f044113fe5f192ba26d7854a5b686f79fe54