Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe
-
Size
421KB
-
MD5
8a1769f96800f89d892ecd5a2b207c69
-
SHA1
11d2fcd14f9dfc437c59121ab22ea6dafb1b6c6d
-
SHA256
f353319cd5557404029077a46191c336bb00eae9acb25a87c38e0df729ab02fc
-
SHA512
14c95afbfda7e0ba048d4274ac7d4602ea6458d7c32504aa26b5566e1b3678944b9b44f2634d049a6b805673eb83cc6226d39a32403116d6dc07afdb0c20ca83
-
SSDEEP
12288:0plrVbDdQaqdS/KfraFErH8uB2Wm0SX/Nr5FU:wxRW+Fucuvm0a/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4372 English.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Dutch\English.exe 2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1996 2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe 1996 2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe 1996 2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe 1996 2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe 4372 English.exe 4372 English.exe 4372 English.exe 4372 English.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 4372 1996 2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe 85 PID 1996 wrote to memory of 4372 1996 2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe 85 PID 1996 wrote to memory of 4372 1996 2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-19_8a1769f96800f89d892ecd5a2b207c69_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\Dutch\English.exe"C:\Program Files\Dutch\English.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4372
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD5fe00f167deadc14b370512cd965b1d4c
SHA1eec1e6e51edaee92175b82e1ccd59c64d5195417
SHA256a59834851ac91e393162e57a4116fa04b36f1a7d7efdb281e9a5103799dd4fa7
SHA51283eb3eec15704e8cc3c81abf067fcd0424ac5c2da92b13148ef52730d6b7e0aeb4dcf3dc08aef68d91c875483c8bc3d320327e6b44905600058a22e99411d92a