Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe
-
Size
420KB
-
MD5
cc4d4558445d95445bd290452febb3c3
-
SHA1
a344a48b89ea665be0ba1093bcd831aef03867a1
-
SHA256
58f0ebf7fb2ade707a4f44bff030f761d531dc4d398e387dc731d608cbc88a9b
-
SHA512
6681bef2be71ae77b31a4f31faed256e6ddb485c5ce02816499fee985cfd8633bf82c60fbccb5f9afe42659a73525f0f2e58f554b80db9dff32f6310229ffade
-
SSDEEP
12288:1plrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:nxRW+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 waysto.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Before\waysto.exe 2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4628 2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe 4628 2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe 4628 2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe 4628 2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe 2620 waysto.exe 2620 waysto.exe 2620 waysto.exe 2620 waysto.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4628 wrote to memory of 2620 4628 2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe 84 PID 4628 wrote to memory of 2620 4628 2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe 84 PID 4628 wrote to memory of 2620 4628 2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-09_cc4d4558445d95445bd290452febb3c3_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files\Before\waysto.exe"C:\Program Files\Before\waysto.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD503f700c4da44358918eac0215e8953e5
SHA18b43129ee09617646083d0023c2c14b5efa9e180
SHA256a1a87456fac419a2f4b08b3486df1fa83ee28aeab2f2ebdec277a9620ac2e721
SHA512d217ed600dca620380b2540ccba2c4495a08a6658290c636ef5c1c723501ede8d9c1032b2575c7c40dbf95296aab26ae7cd2b3597018c629f6261c247e470deb