Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe
-
Size
396KB
-
MD5
a4f87d834c4e636068e4ec2e186d4a30
-
SHA1
44f610e18ffa6b6340d892f4d1890c92d31d0b6d
-
SHA256
8bdfaec6c09a8214b59a2add80a3a8213a8f2d1767a2abfb446a4fbee7ead869
-
SHA512
36c77eba9533ce7eabc8f281b2ca35f069d0f3ffae4ef0818289a10a5fc1b84458bee59c33c519cc496b9def9242bc114d92839d1613bbffc551559d86da1f67
-
SSDEEP
12288:bplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:NxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2136 towrite.exe -
Loads dropped DLL 2 IoCs
pid Process 1932 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 1932 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\having\towrite.exe 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1932 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 1932 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 1932 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 1932 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 2136 towrite.exe 2136 towrite.exe 2136 towrite.exe 2136 towrite.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2136 1932 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 28 PID 1932 wrote to memory of 2136 1932 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 28 PID 1932 wrote to memory of 2136 1932 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 28 PID 1932 wrote to memory of 2136 1932 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\having\towrite.exe"C:\Program Files\having\towrite.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5e630305c15feca91c42c0a415bea9cec
SHA167705efdd4626d85f981d7daab802ee7b68a6823
SHA25639decf37b04b43b4887327f4a667cebfa892a0c601d0b41e42f8d92f3126c623
SHA51203967f9548eaa1a85ba4f70c8ba585ac666fe43539454379cb483646ae9f570db2223b3f82f35f337956d52f5ed804c1de1bb112592c61bb05b9cc52a644b376