Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe
-
Size
287KB
-
MD5
ba824a900f7cfa7b26c65b2b85fb11dd
-
SHA1
e6c0b9e156a7c2d196ea1cc5f2ae54da5ca5123d
-
SHA256
7d12ba7454c59f6aadb0c594834f11d887243052a003de951c2d79290bae0ade
-
SHA512
7131d7ef444b1c727d8d9dfae7f4801ab368e0c47d64ec67077709d4472a4d71dcdc8471b5518a365b99946e195b0c544a3fde49a76db1bcf87d906a3e31246a
-
SSDEEP
3072:lxUm75Fku3eKeO213SJReOqdmErj+HyHnNVIPL/+ybbiW1u46Q7qV3lU8xM:fU8Dk11CJ1qDWUNVIT/bblS9x
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1676 upgraded..exe -
Loads dropped DLL 2 IoCs
pid Process 1612 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe 1612 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\MessageBox\upgraded..exe 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe File created C:\Program Files\MessageBox\upgraded..exe 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1612 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe 1612 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe 1612 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe 1612 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe 1676 upgraded..exe 1676 upgraded..exe 1676 upgraded..exe 1676 upgraded..exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1676 1612 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe 28 PID 1612 wrote to memory of 1676 1612 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe 28 PID 1612 wrote to memory of 1676 1612 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe 28 PID 1612 wrote to memory of 1676 1612 2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_ba824a900f7cfa7b26c65b2b85fb11dd_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files\MessageBox\upgraded..exe"C:\Program Files\MessageBox\upgraded..exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD56d0c248bb60988ecba494431665be10a
SHA126e9eec2fa76594ab36e0d0535b5adbe27f76c29
SHA256e53631224f75edac214c85c1b016d62f0b44f589d9046c87f6c3bb0b758d964f
SHA5124312d0a4577dc957f7e45bec9799a50c542409be99b5f0a4f561c54ea2dc0ffc197f45e30ff065f06268d90fb02e52c44b695f00fd08f8d17535c9ee95bceba1