Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe
-
Size
269KB
-
MD5
cc4acb9aa985db47b37d8014e0e6b17e
-
SHA1
fd6881aab5f86d25d5302370c0eb6749de24a6ec
-
SHA256
c16857be013be6363475b62e4d2e96b761242077489bf62932b80ac651b6cda9
-
SHA512
50f5eb81b870c639e95c2af7c39269879ab7c164f506f12a5c8012e26c7804afc6c9be982910a4099fe6f52882858a5ed5162292c82a1be92f147b56ca902ef6
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2404 released.exe -
Loads dropped DLL 2 IoCs
pid Process 364 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe 364 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Dependency\released.exe 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe File opened for modification C:\Program Files\Dependency\released.exe 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 364 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe 364 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe 364 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe 364 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe 2404 released.exe 2404 released.exe 2404 released.exe 2404 released.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 364 wrote to memory of 2404 364 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe 28 PID 364 wrote to memory of 2404 364 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe 28 PID 364 wrote to memory of 2404 364 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe 28 PID 364 wrote to memory of 2404 364 2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-11_cc4acb9aa985db47b37d8014e0e6b17e_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Program Files\Dependency\released.exe"C:\Program Files\Dependency\released.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD5dcf91dd8092e4c5754be76a5f5604ace
SHA177420f83f4fd110440095ec2d0bc45b95327d33c
SHA256b34cff88feb5228355fdfcd3ba8fa63ee183d7b21edd2f39f326213d4b0ed4df
SHA512866c0f723a7cc45411780bde2b39b7a3f5e18615644d542c361640245a3aece3ac8df3e160c356e275a7eee5c9a49157dd720fab9021ca316ea75235d47fc481