Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe
-
Size
317KB
-
MD5
e84cc366d68cd2ed1801ee798c915b6b
-
SHA1
af01c04dfd7f339cfc3ec1eeffc86381d9a03d19
-
SHA256
7200ed19c7b59d43be5dc05c1ac776ede0e23c037269970726c16ef10b58f576
-
SHA512
fa896dd9192c4dc1678c707ffe0b629160a5191e4cd290d586274406b99b29d90ca581253960f770a99e697d11e4b702bfdc543d371462761992c69a951aa80e
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1776 Autorun.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Panel\Autorun.exe 2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe File opened for modification C:\Program Files\Panel\Autorun.exe 2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 760 2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe 760 2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe 760 2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe 760 2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe 1776 Autorun.exe 1776 Autorun.exe 1776 Autorun.exe 1776 Autorun.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 760 wrote to memory of 1776 760 2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe 89 PID 760 wrote to memory of 1776 760 2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe 89 PID 760 wrote to memory of 1776 760 2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-07_e84cc366d68cd2ed1801ee798c915b6b_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files\Panel\Autorun.exe"C:\Program Files\Panel\Autorun.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1776
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD545caed8acfee7afd47494efcecc9c966
SHA1506c6dd9979d4747856361dfe2776eaa63b9ddf2
SHA256daeb0fa1c3858f4ab14974d9d1d2176fd038ec87c48fb45f9f0e7564016ade36
SHA51254b6ff4c0d826b2f3d75a6c2432f17ef9866db9076d2f5cc8fcdffc876d425ff926c6e493cf2d928b7d0419207eba09d87f5c675e222b778b6c1d8736da0389b