Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 12:33

General

  • Target

    2024-03-16_65a0003ff62b0e6489452e6b03c150dc_icedid.exe

  • Size

    268KB

  • MD5

    65a0003ff62b0e6489452e6b03c150dc

  • SHA1

    2c12bfb9509400ae26bdc4e43ebf2678f62ceefe

  • SHA256

    fe8fba4ce816927ebe606de57972172e1b5cbf79d0c60fde58c5490e85b9736e

  • SHA512

    6b14fa2003405ad1ec352e0dcd0984237e2f0d8b9bb8e545328e12d433f750034287a4f3f4e5fd27ca6a50226abfaa7bbcfa63f6b7d8a92f5d22b72e4edf01ed

  • SSDEEP

    3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-16_65a0003ff62b0e6489452e6b03c150dc_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-16_65a0003ff62b0e6489452e6b03c150dc_icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files\Checking\Installed.exe
      "C:\Program Files\Checking\Installed.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:3068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Checking\Installed.exe

    Filesize

    268KB

    MD5

    ba7bc687eb20dab15410faf1f4da93aa

    SHA1

    e1573f96948e30c04d2c7de0dd49f20a3d9df7dc

    SHA256

    d6dbe63f5de9c84b2fe2ac6b0a787d878b5d50aac5160b06eddcaf74c0e82da8

    SHA512

    20865a4ef37bc4d4ddc5f5dcd81cb7a89c644714f0725448a33e22cc846e4ee8d0f08e7f592d43fdfbe84c631a8aa9158be16f6c6c9b61999561db23a148d7de