Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe
-
Size
419KB
-
MD5
f8be4dca27f7926738635adc2762b8ea
-
SHA1
909c3f2fcbba136e7f0064f943139a715b67af4e
-
SHA256
fcccb05f5e2e2a40dbd0bfbd065227d330d1bdc60f850179319d0b0641dd0d78
-
SHA512
d4ad69be82942a4d76a3e7957119f218cc1664fcb804bd9f0dae0af640e20ab64241f0541737594f8f2b2564a7b92cfa1051d9066a3a4d9388666caf19481eac
-
SSDEEP
12288:lplrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:XxRW+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3052 function.exe -
Loads dropped DLL 2 IoCs
pid Process 2340 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe 2340 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\depend\function.exe 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2340 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe 2340 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe 2340 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe 2340 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe 3052 function.exe 3052 function.exe 3052 function.exe 3052 function.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 3052 2340 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe 28 PID 2340 wrote to memory of 3052 2340 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe 28 PID 2340 wrote to memory of 3052 2340 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe 28 PID 2340 wrote to memory of 3052 2340 2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_f8be4dca27f7926738635adc2762b8ea_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files\depend\function.exe"C:\Program Files\depend\function.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD5bf4b5fc99d0322485200da5c5673341f
SHA1d879a84bbd3404a8a5a35fa322606c6c012a61e2
SHA2560bc50d25800b87698b623f0c02e882626e383041213d78a3fa9e232bd542b034
SHA512a410f2185478989a4b9ca22d84454e70ef908f8e954314677bdd9e99c18cb7e4d4b2188648bd01035291b225a03e8943055c4bae4da5dc3d778bc6e211e3e180