Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 23:25
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe
Resource
win7-20240508-en
6 signatures
150 seconds
General
-
Target
2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe
-
Size
3.0MB
-
MD5
816865c94bea242b2d148205c2444b4c
-
SHA1
f146189bb697c35735069236b3bdc1372cb69138
-
SHA256
8a5b852d539fe0603ccaa00e289864e5b67e4f882ebc0cd72e60285837d5ed41
-
SHA512
9b39d988b3ad0ff377b8f6c8c197c44580135a6997130f686e270b2787e07730f13ea0c7bc6e9dc0d4713077a94de812e5d249fb3900ef283c7232273fdf9bec
-
SSDEEP
49152:OoLCDOEf4wpDyp6ano1RYsj4Eh5SLiToV1Tw0jqXp55N:xeDOEf4wkp6FYskEhiqoE0jq
Malware Config
Signatures
-
Detects executables packed with VMProtect. 3 IoCs
resource yara_rule behavioral1/memory/1920-51-0x00000000028A0000-0x0000000002A6D000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral1/memory/1920-54-0x00000000028A0000-0x0000000002A6D000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral1/memory/1920-53-0x00000000028A0000-0x0000000002A6D000-memory.dmp INDICATOR_EXE_Packed_VMProtect -
UPX dump on OEP (original entry point) 25 IoCs
resource yara_rule behavioral1/memory/1920-0-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-1-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-2-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-3-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-11-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-5-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-9-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-7-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-24-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-43-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-46-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-50-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-49-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-40-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-38-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-36-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-34-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-31-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-28-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-26-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-22-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-19-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-15-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-13-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral1/memory/1920-60-0x0000000010000000-0x000000001003F000-memory.dmp UPX -
resource yara_rule behavioral1/memory/1920-0-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-1-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-24-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-46-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-50-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-49-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-40-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-38-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-36-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-34-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-28-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-26-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-22-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/1920-60-0x0000000010000000-0x000000001003F000-memory.dmp upx -
resource yara_rule behavioral1/memory/1920-51-0x00000000028A0000-0x0000000002A6D000-memory.dmp vmprotect behavioral1/memory/1920-54-0x00000000028A0000-0x0000000002A6D000-memory.dmp vmprotect behavioral1/memory/1920-53-0x00000000028A0000-0x0000000002A6D000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1920 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1920 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe 1920 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe 1920 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe 1920 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe 1920 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe