Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe
-
Size
420KB
-
MD5
42ad5fc0331251fd818af1ea38ec67d8
-
SHA1
e78a1abefaaf361f5e327f484fd78a013a8a2784
-
SHA256
75c2adc20159afc7236afdbfce926f15df336ce6e93d038ab0486ef3deb1f08f
-
SHA512
d86c781950aca621ec109587057eb64f10a150f6c14e1910a6d78421809ef35fc1312b4a35b626593f45081aaf78232d02cd819d86e6a130a5a5edd1c87cf085
-
SSDEEP
12288:CplrVbDdQaqdS/ofraFErH8uB2Wm0SX/Nr5FU:OxRQ+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4244 Standard.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Version\Standard.exe 2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5024 2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe 5024 2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe 5024 2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe 5024 2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe 4244 Standard.exe 4244 Standard.exe 4244 Standard.exe 4244 Standard.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5024 wrote to memory of 4244 5024 2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe 84 PID 5024 wrote to memory of 4244 5024 2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe 84 PID 5024 wrote to memory of 4244 5024 2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_42ad5fc0331251fd818af1ea38ec67d8_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files\Version\Standard.exe"C:\Program Files\Version\Standard.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4244
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD5d74667277a9b98469e93a8e1a602a361
SHA18f7343cf79c0d5545270d8eb7776b8857a9a1e25
SHA2564e3b484be3b3f3ec3e782d42e2218366aa8c59e736b0e4f7ee31a9dcae144f62
SHA51200b56b7f73f7e084a3e6d228551bb08d3f72e3ab80e121e8bb123b70a7be947e663b0c68269bce201f993094c4bd51a1543175e56f66431d04adbda833cfada6