Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe
-
Size
269KB
-
MD5
dd748f51e26916c3a3551d92c5a49b2b
-
SHA1
32d612668ed31e2cfc4b2fc1fda58f8f9b0b0949
-
SHA256
b4d7bd99afa2825ddea44c81049ae5a5b52825826ff11d63d635e17172e525b4
-
SHA512
2de0a0d7b3eb42169276ab37fdffe8c003bc423d0a9938769f04a6d25f410d52f9a21c45654d636b395afacdab688b2c9e4a2b0710600d514708d69ee160f200
-
SSDEEP
3072:lxUm75Fku3eKeJk21ZSJReOqlz+mErj+HyHnNVIPL/+ybbiGF+1u46Q7q303lU8O:fU8DkpP1oJ1qlzUWUNVIT/bbbIW09R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 Framework.exe -
Loads dropped DLL 2 IoCs
pid Process 2784 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe 2784 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\verify\Framework.exe 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe File created C:\Program Files\verify\Framework.exe 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2784 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe 2784 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe 2784 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe 2784 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe 3040 Framework.exe 3040 Framework.exe 3040 Framework.exe 3040 Framework.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3040 2784 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe 28 PID 2784 wrote to memory of 3040 2784 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe 28 PID 2784 wrote to memory of 3040 2784 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe 28 PID 2784 wrote to memory of 3040 2784 2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_dd748f51e26916c3a3551d92c5a49b2b_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\verify\Framework.exe"C:\Program Files\verify\Framework.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD54ba6b32579066ec712c096a958680b11
SHA158a0409eb4cbf9beafe02b11836308685a35dfec
SHA2567a006c6f39222d2b70dab9fb8d296820643292317932b60c57d3edd2efb6420e
SHA5123a1ba971e55c8c7ea390d4ac53e0c297172888bfd34639a20be1aac38b61d4e0d0bbe7dc77ed84b227c89233d1d98fb9ad96b268faa8cb2cf1b71d5860517f57
-
Filesize
269KB
MD510480478081752387d776e5a76fab884
SHA1a18bc7955541a9a79a99ff1227c40f75c9c73828
SHA256523e133f67b310eedebf276c796bd9dd0be6067ec4faaedfecc75a9d9329feff
SHA5122eba292403655ad0d758538ec99323a70e26bf7b57687b7a1e0c48dbc1430ce5220c852b1ceaf14296f38191ccd5ad5e5acc290e757c711fb9fa169a5453d02e