Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe
-
Size
316KB
-
MD5
10d8add7423a198bcdcd78b5d3f2b03a
-
SHA1
01874d6eb8ec111111af74888e691ba74424da13
-
SHA256
a88dd3764b817de70e70e14a7fe162ab4b6fc67afecbbd552c10cf290d782470
-
SHA512
cc287085965067587b68b0802d0b35e7143a7b8126c2ba37caf01a75ff4d5bc82568265543c665e8d7ce3cf99d099718b4ef8dbb0613762ebf2a080e92bc5a86
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4212 games.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\and\games.exe 2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe File opened for modification C:\Program Files\and\games.exe 2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2108 2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe 2108 2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe 2108 2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe 2108 2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe 4212 games.exe 4212 games.exe 4212 games.exe 4212 games.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2108 wrote to memory of 4212 2108 2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe 88 PID 2108 wrote to memory of 4212 2108 2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe 88 PID 2108 wrote to memory of 4212 2108 2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_10d8add7423a198bcdcd78b5d3f2b03a_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files\and\games.exe"C:\Program Files\and\games.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4212
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD5c25a58fb05e690cb1e39f1cbbae1bd6d
SHA1ff93bce39d2388257d6105e306198755ef5049d0
SHA2565f5df6cc9b7257e78df5e880d588bbac9fe1470ea9f6d75f64647e7dc11a865c
SHA512217f2110fc1cefcf9a8033344b10ba13612734718d15dc4b3d1f0808ef615bf155d29824912c63ac443de50ccf2f0f65f47a4a5ba4cc9db04e95da2323786b00