Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe
-
Size
584KB
-
MD5
af85f97e5cb8779a018a6a2c176f6e8d
-
SHA1
9deffd019950f2b0a51c0d3c03b48450cdd5cba3
-
SHA256
92bc946c3a6ed72ae7b47f4b20c394bddbc532fa8802b8535bee027927ef38e9
-
SHA512
85434a1eed1a316803810353557b81678e8a532443e45e3a65ebddc26c5ad44ed6fc00872c0764c710da99c6ff2eefdbf334c5e65b0b47a5d6efa6c3ce5d2c3c
-
SSDEEP
12288:/plrVbDdQaqdS/RfraFE/H8uB2Wm0SXsNr5FU:RxR1+FCcuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 customer.exe -
Loads dropped DLL 2 IoCs
pid Process 2240 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 2240 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\require\customer.exe 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2240 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 2240 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 2240 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 2240 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 3032 customer.exe 3032 customer.exe 3032 customer.exe 3032 customer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3032 2240 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 28 PID 2240 wrote to memory of 3032 2240 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 28 PID 2240 wrote to memory of 3032 2240 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 28 PID 2240 wrote to memory of 3032 2240 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files\require\customer.exe"C:\Program Files\require\customer.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
584KB
MD54b2a046bc5fea1b5a276cecef08b4eec
SHA10bcde5a5fbfe1fb88c231049ea38f6df3d15ea74
SHA2568f0695ac3472b681ab35b4894df73945c33b800ead8edb1a9c7e465eb54bb098
SHA5122c3b4eaf6c7851cd10f124cf1962ede7291ba92650f8ea15ebcb991344dff5875b744b1b27faaa5e0b2c83fd547844178395ae21f90d916e49a86b87c924f620