Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe
-
Size
584KB
-
MD5
af85f97e5cb8779a018a6a2c176f6e8d
-
SHA1
9deffd019950f2b0a51c0d3c03b48450cdd5cba3
-
SHA256
92bc946c3a6ed72ae7b47f4b20c394bddbc532fa8802b8535bee027927ef38e9
-
SHA512
85434a1eed1a316803810353557b81678e8a532443e45e3a65ebddc26c5ad44ed6fc00872c0764c710da99c6ff2eefdbf334c5e65b0b47a5d6efa6c3ce5d2c3c
-
SSDEEP
12288:/plrVbDdQaqdS/RfraFE/H8uB2Wm0SXsNr5FU:RxR1+FCcuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4316 Morgan.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\topics\Morgan.exe 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1424 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 1424 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 1424 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 1424 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 4316 Morgan.exe 4316 Morgan.exe 4316 Morgan.exe 4316 Morgan.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1424 wrote to memory of 4316 1424 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 90 PID 1424 wrote to memory of 4316 1424 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 90 PID 1424 wrote to memory of 4316 1424 2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-23_af85f97e5cb8779a018a6a2c176f6e8d_icedid.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files\topics\Morgan.exe"C:\Program Files\topics\Morgan.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3820 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:2312
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
584KB
MD5fc94a448c15fd02e5e8b8b292d7ac50c
SHA1a527edf634e43b964af53b4ac8d2304eba4e805d
SHA2568b57a8c67e3ad4e7958623bd1baed1ce6078271b400572f8132c6612ef315977
SHA5128db75936d32bcfb432b3ed2a1d284f75146cc9237c413616791f4f4f62daac446ca38e7181b2f79a0f65631c8434146e84ff461ccde072c5f17a1640965124d3