Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe
-
Size
585KB
-
MD5
ce571963da60a0cbeff185a28d9a8f40
-
SHA1
e5f9a710acd2b1fb4fcd9e8c8cd8e6ee8c0389b1
-
SHA256
34bb0aa33d1cae08192a035e40d3b401fccc7ee8e9bf884b90ab1b47f27d849f
-
SHA512
06f670175f3773b8b285082dc8e229a9cc655df58d3516753d751e8446913e2b198b415c897cbfd3f2b684a0ad6c9ce2bba2903d521e53486992fb7e84013fe0
-
SSDEEP
12288:2plrVbDdQaqdS/ofraFErH8uB2Wm0gXsNr5FU:SxRQ+Fucuvm0os
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4380 Redistributable.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\instructions\Redistributable.exe 2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 836 2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe 836 2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe 836 2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe 836 2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe 4380 Redistributable.exe 4380 Redistributable.exe 4380 Redistributable.exe 4380 Redistributable.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 836 wrote to memory of 4380 836 2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe 85 PID 836 wrote to memory of 4380 836 2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe 85 PID 836 wrote to memory of 4380 836 2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-18_ce571963da60a0cbeff185a28d9a8f40_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files\instructions\Redistributable.exe"C:\Program Files\instructions\Redistributable.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4380
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
585KB
MD58fc9ffe8269a797f112e37ac55e5d262
SHA15b40a01319e731194a8b50522c55807dc6dc3f23
SHA2560a80bdccee3d58be2d449583b8f756be98145590641dd9f844ebaaa988d74dba
SHA51235e4a0c601933bef0f77995e4e8e59bd2d1ea5c79e1f45cb0c5349018d0dbc491a590ca07b577dfe3b56c7df52571e3ee6be65ad6a261f6afe44b1c60b63c431