Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe
-
Size
266KB
-
MD5
76ab95bcb774dacfa6d5643aaa74e087
-
SHA1
b13c688ec83f09d2d611bdc315b25451525f966e
-
SHA256
b905bc9a8a13d9f61a730823bab56699a474e154974636001e5576178f38e5e3
-
SHA512
30baa3013be7203db4c05be0f7b9e5ef1bc4f4fdec306137a8e0fc5004402f371a0c0e206096b738f09fd2f355257f306d16dc6f092128699da76a21293aeff5
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4160 privileges.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Internals\privileges.exe 2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe File opened for modification C:\Program Files\Internals\privileges.exe 2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1904 2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe 1904 2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe 1904 2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe 1904 2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe 4160 privileges.exe 4160 privileges.exe 4160 privileges.exe 4160 privileges.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1904 wrote to memory of 4160 1904 2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe 88 PID 1904 wrote to memory of 4160 1904 2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe 88 PID 1904 wrote to memory of 4160 1904 2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_76ab95bcb774dacfa6d5643aaa74e087_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files\Internals\privileges.exe"C:\Program Files\Internals\privileges.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4160
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266KB
MD5d68f023470a00aa1c53df82cc878f11e
SHA1c834fa00830ec78c534f9ca2d10502de69c05b7a
SHA2566b01a5bb0f9378337960d4f20113a38772bb5388f1ac3fdcf860a45bfe3a307f
SHA51291f5c061417f2c592a4f13020497156c11f21432e570caf9e0a6d6a1a8f8c7074c206afcae6aca9d27f1db25eb4eee43a3bae836c6100c9acc0bca2035989e98