Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe
-
Size
396KB
-
MD5
a4f87d834c4e636068e4ec2e186d4a30
-
SHA1
44f610e18ffa6b6340d892f4d1890c92d31d0b6d
-
SHA256
8bdfaec6c09a8214b59a2add80a3a8213a8f2d1767a2abfb446a4fbee7ead869
-
SHA512
36c77eba9533ce7eabc8f281b2ca35f069d0f3ffae4ef0818289a10a5fc1b84458bee59c33c519cc496b9def9242bc114d92839d1613bbffc551559d86da1f67
-
SSDEEP
12288:bplrVbDdQaqdS/ofraFErH8uB2Wm0SXsNr5FU:NxRQ+Fucuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4608 having.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\without\having.exe 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2244 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 2244 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 2244 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 2244 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 4608 having.exe 4608 having.exe 4608 having.exe 4608 having.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2244 wrote to memory of 4608 2244 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 85 PID 2244 wrote to memory of 4608 2244 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 85 PID 2244 wrote to memory of 4608 2244 2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_a4f87d834c4e636068e4ec2e186d4a30_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files\without\having.exe"C:\Program Files\without\having.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5d430d34f33508f9fd7be63ec756a1ea3
SHA1dc850691349944a475907f7b0e217472cbf8faac
SHA256b9f17add007f14f6f77db27db6ff98373172deee2c5218f66c1f1785f4c969de
SHA512f2ecc4a9597250875a9c83d4afe063962631dc205bb415529809f615291a0c4f88c88ed78b44c7d86d947a0bae9685c263398510cedd303c939ed74c4dad8e15