Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe
-
Size
267KB
-
MD5
1e729b660c0844bf889c4be0e910af6c
-
SHA1
5c1b05177a05a96b1a70873dc568e9d89d6cd5be
-
SHA256
3e3559e5618082e904fb4404ff25753287444a7b4048e972c98dcf13367f20d4
-
SHA512
a14a50d0cf2e0c65d3fa3b7ad75c462e1ab47b0d108b83bd5f3b4cd495df5ad1736961731f9f448e4f5bc32b66578d43f2981503af21a79f6d0b9ca628135cf0
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3052 thatcomes.exe -
Loads dropped DLL 2 IoCs
pid Process 2784 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe 2784 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\library\thatcomes.exe 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe File created C:\Program Files\library\thatcomes.exe 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2784 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe 2784 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe 2784 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe 2784 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe 3052 thatcomes.exe 3052 thatcomes.exe 3052 thatcomes.exe 3052 thatcomes.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3052 2784 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe 28 PID 2784 wrote to memory of 3052 2784 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe 28 PID 2784 wrote to memory of 3052 2784 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe 28 PID 2784 wrote to memory of 3052 2784 2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_1e729b660c0844bf889c4be0e910af6c_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\library\thatcomes.exe"C:\Program Files\library\thatcomes.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5d969347dc974ec905621b6c37c7a54ab
SHA16ecfcfa649bfa73678b8096dcc4304f6fc082ddb
SHA25662c539d4d229914d95f6f59ec7e49855d7fcbf79ba8c11a67e1668618e7d057c
SHA51232bcb523a0caadff383ae85a73f6efd2b82bc984a6bcef601d57fe5b7d6963adac5c5d3073492e464ec59a9721fed791c68b98770daa634b925235b756da67ee
-
Filesize
267KB
MD523eab7f405efab97bbd1b010f9fd7144
SHA11684b874357dd16930208c2e855da9312048fe21
SHA256e0a1fba4d5bc0979882f0857d4e9941591aee55a5f83b9e0b9e2bb4b517509e1
SHA512d123b0667e1416bc06abd2340f430dec73c9c745643f0acce089a1ba10c73890bff57d59d122fb4ae766d576672f5ef76015353dd931b70862d1998377ea8c25