Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 23:25
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe
Resource
win7-20240508-en
6 signatures
150 seconds
General
-
Target
2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe
-
Size
3.0MB
-
MD5
816865c94bea242b2d148205c2444b4c
-
SHA1
f146189bb697c35735069236b3bdc1372cb69138
-
SHA256
8a5b852d539fe0603ccaa00e289864e5b67e4f882ebc0cd72e60285837d5ed41
-
SHA512
9b39d988b3ad0ff377b8f6c8c197c44580135a6997130f686e270b2787e07730f13ea0c7bc6e9dc0d4713077a94de812e5d249fb3900ef283c7232273fdf9bec
-
SSDEEP
49152:OoLCDOEf4wpDyp6ano1RYsj4Eh5SLiToV1Tw0jqXp55N:xeDOEf4wkp6FYskEhiqoE0jq
Malware Config
Signatures
-
Detects executables packed with VMProtect. 3 IoCs
resource yara_rule behavioral2/memory/556-43-0x00000000028A0000-0x0000000002A6D000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/556-46-0x00000000028A0000-0x0000000002A6D000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/556-47-0x00000000028A0000-0x0000000002A6D000-memory.dmp INDICATOR_EXE_Packed_VMProtect -
UPX dump on OEP (original entry point) 25 IoCs
resource yara_rule behavioral2/memory/556-0-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-34-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-45-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-42-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-40-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-32-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-30-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-28-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-26-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-24-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-22-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-21-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-18-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-16-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-14-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-12-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-10-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-8-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-6-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-38-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-36-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-4-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-2-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-1-0x0000000010000000-0x000000001003F000-memory.dmp UPX behavioral2/memory/556-53-0x0000000010000000-0x000000001003F000-memory.dmp UPX -
resource yara_rule behavioral2/memory/556-0-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-34-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-45-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-42-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-40-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-32-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-30-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-28-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-26-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-24-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-22-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-18-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-16-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-14-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-12-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-10-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-8-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-6-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-38-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-36-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-4-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-1-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/556-53-0x0000000010000000-0x000000001003F000-memory.dmp upx -
resource yara_rule behavioral2/memory/556-43-0x00000000028A0000-0x0000000002A6D000-memory.dmp vmprotect behavioral2/memory/556-46-0x00000000028A0000-0x0000000002A6D000-memory.dmp vmprotect behavioral2/memory/556-47-0x00000000028A0000-0x0000000002A6D000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 556 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe 556 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 556 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe 556 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe 556 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe 556 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe 556 2024-06-24_816865c94bea242b2d148205c2444b4c_icedid.exe