Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe
-
Size
390KB
-
MD5
bb71cbe585a401086ac630f5bc866a28
-
SHA1
4733663ba9193a8f3056b665424c1cf5f4c9d573
-
SHA256
246857856ceb29dfd00dee12a91fb057960538306b317c80102105561b08b714
-
SHA512
84a6b9cd36d7c3844db36b2fb362c25a4c85e888bf0fdde24b40dadadc7ebf4cdb56f4eeddc188bb21a4dcde1041fdb76c5e8a03c52573b820bc1464eef4615a
-
SSDEEP
12288:AplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:cxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2956 appropriate.exe -
Loads dropped DLL 2 IoCs
pid Process 2520 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe 2520 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\development\appropriate.exe 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2520 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe 2520 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe 2520 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe 2520 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe 2956 appropriate.exe 2956 appropriate.exe 2956 appropriate.exe 2956 appropriate.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2956 2520 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe 29 PID 2520 wrote to memory of 2956 2520 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe 29 PID 2520 wrote to memory of 2956 2520 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe 29 PID 2520 wrote to memory of 2956 2520 2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_bb71cbe585a401086ac630f5bc866a28_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\development\appropriate.exe"C:\Program Files\development\appropriate.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5c9610a92e4e746453530b2d6a83dcfa0
SHA1f6275d0caa1cadb687f714032395287366abd7bf
SHA256069d4d264d7e0080e4cbb84712c0db0bd0b681c8d85a95c41ffb0f47b24db657
SHA5121d13fde81a6c48453e35754dccec0344803d50c0dac8e9885068d71b6ae2a585195aef54c4ad9194ba0c4fcddfcbe4c4480eff9376eddf66046939fcf922ea8c
-
Filesize
192KB
MD589f9d4e4c5de207d687b0d32e81bff0f
SHA198359419fb270ece4d77baa090fbce4c44205017
SHA2562ed20d7a2204044c6721a8e2facfcb5fcd8ee0162ceaccd0435e827fb065500e
SHA512211d251283d9274b6c1611fab89cd08a0a2ddd432e1d1c67a5bf9c7c5979ead1e57278a7229511072beecf892f507e46a1a8a2d00ff0c0fa1f9f7f4280126562
-
Filesize
160KB
MD5be04a020f6689d82b2d3feb40dcaa8a4
SHA17d4527842b15a91fae89e0093deb464cd43e8185
SHA256a7ab94fb060d2fee6c9f042a1b57d23f4fdff13e3700c6c750fca64271776b94
SHA5122b9df8fda106f4d7ab71a7d5a168140d37430661a23c80c83bc7c07b13ec2de5e3ae0043af51f4ed2d1106473e1e10e6fa8ba65b6b9aab7dbabb87a3f770fc62