Static task
static1
Behavioral task
behavioral1
Sample
94a4c7605cb1276f73b0b3be360ba3a4_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
94a4c7605cb1276f73b0b3be360ba3a4_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
94a4c7605cb1276f73b0b3be360ba3a4_icedid_JC.exe
-
Size
2.6MB
-
MD5
94a4c7605cb1276f73b0b3be360ba3a4
-
SHA1
efff7bb15f7e2342fedba099e5af9f2f15fd60d0
-
SHA256
e8e6ba12b5404110b13355f4f838071156741a98ff05496d17c2df4af8394090
-
SHA512
0c88215cffcf4bda7c7f36f99885d4eae1925f108ebc83d65d4b2ed0b7f8ebd183b9271ea6bccbb0849585ca1cb2b66da08dd2a09e440b411e602a10b39fe150
-
SSDEEP
49152:DvVjWalgryFKS/oAF7c2TrPV76TOTfu9nV2vgMWR01nNZgqxY+b1ZUfrvmZsn0zf:DvVjWalQ/S5eMrtLzu9nAvgfRlaAl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 94a4c7605cb1276f73b0b3be360ba3a4_icedid_JC.exe
Files
-
94a4c7605cb1276f73b0b3be360ba3a4_icedid_JC.exe.exe windows x86
a14d64429e2ef9e4dcf2e9b5b89e830a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCreateFromHDC
GdiplusShutdown
GdipDrawImageRectI
GdiplusStartup
GdipDisposeImage
GdipAlloc
GdipCloneImage
GdipDeleteGraphics
GdipLoadImageFromStream
GdipFree
kernel32
SetUnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
UnhandledExceptionFilter
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetCurrentDirectoryA
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetDriveTypeA
SetEnvironmentVariableA
VirtualAlloc
HeapSize
ExitProcess
HeapReAlloc
RaiseException
GetNumberOfConsoleInputEvents
PeekConsoleInputA
GetSystemTimeAsFileTime
RtlUnwind
GetStartupInfoW
GetProcessHeap
HeapAlloc
HeapFree
GetTickCount
SetErrorMode
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetCurrentDirectoryW
FindResourceExW
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedIncrement
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetShortPathNameW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
GetStringTypeExW
DeleteFileW
MoveFileW
GlobalGetAtomNameW
GetDiskFreeSpaceW
GetFullPathNameW
GetTempFileNameW
GetFileTime
SetFileTime
GetFileAttributesW
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
VirtualProtect
GetModuleHandleA
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
GetVersionExA
InterlockedDecrement
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
LoadLibraryA
MulDiv
FindFirstFileW
FindNextFileW
FindClose
FormatMessageW
GetCurrentThread
GetCurrentProcess
LocalAlloc
LocalFree
QueryPerformanceFrequency
QueryPerformanceCounter
GetConsoleMode
SetConsoleMode
GetStdHandle
GetConsoleScreenBufferInfo
WaitForSingleObject
PulseEvent
CopyFileW
lstrcmpW
DeleteCriticalSection
InitializeCriticalSection
CreateEventW
GlobalMemoryStatusEx
TerminateThread
GetExitCodeThread
CreateThread
EnterCriticalSection
LeaveCriticalSection
Sleep
QueryDosDeviceW
GetVolumePathNamesForVolumeNameW
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetDriveTypeW
GetVolumeInformationW
WriteFile
SetFilePointer
ReadFile
GetUserDefaultLangID
GetWindowsDirectoryW
lstrcatW
WinExec
lstrcpyW
WideCharToMultiByte
FreeLibrary
SetFirmwareEnvironmentVariableW
GetFirmwareEnvironmentVariableW
CloseHandle
DeviceIoControl
GetLogicalDrives
CreateFileW
CreateDirectoryW
GetComputerNameW
GetModuleFileNameW
SetThreadLocale
GetCPInfo
lstrlenA
GetLastError
SetLastError
GetProcAddress
GetModuleHandleW
LoadLibraryW
lstrlenW
lstrcmpiW
GetVersion
GetVersionExW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
IsDebuggerPresent
user32
WaitMessage
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsW
InsertMenuItemW
BringWindowToTop
TranslateAcceleratorW
WindowFromPoint
FindWindowW
ShowOwnedPopups
PostQuitMessage
GetMessageW
ValidateRect
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
CheckMenuItem
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetActiveWindow
GetAsyncKeyState
GetWindowDC
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
UnregisterClassA
LoadIconW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DestroyWindow
GetMessageTime
PeekMessageW
ScrollWindow
TrackPopupMenu
SetForegroundWindow
ShowScrollBar
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
EqualRect
SetScrollInfo
SetWindowPlacement
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
UnhookWindowsHookEx
CharUpperW
DestroyCursor
SetWindowPos
SetRectEmpty
GetDlgItem
LockWindowUpdate
IsZoomed
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
IntersectRect
AdjustWindowRectEx
GetScrollInfo
MapWindowPoints
IsWindowVisible
EndPaint
BeginPaint
SetWindowRgn
GetCursorPos
SetCapture
RedrawWindow
GetTopWindow
LoadImageW
UnregisterDeviceNotification
RegisterDeviceNotificationW
IsMenu
DrawMenuBar
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
TranslateMessage
DispatchMessageW
SetWindowLongW
LoadCursorW
CopyIcon
IsWindow
SetCursor
GetMessagePos
ReleaseCapture
KillTimer
SetTimer
DrawStateW
RegisterWindowMessageW
GetWindowLongW
DrawFocusRect
DrawIcon
GetWindow
GetKeyState
GetFocus
ScreenToClient
LoadMenuW
EnableMenuItem
TrackMouseEvent
InvalidateRect
UpdateWindow
ClientToScreen
OffsetRect
PtInRect
InflateRect
GetClientRect
MessageBeep
SetMenu
GetMenu
GetMenuItemInfoW
SystemParametersInfoW
DrawIconEx
DestroyIcon
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetSysColorBrush
GetSysColor
GetDesktopWindow
ReleaseDC
UnregisterClassW
SetParent
CopyAcceleratorTableW
PostThreadMessageW
GetTabbedTextExtentA
GetDC
RemoveMenu
ModifyMenuW
InsertMenuW
GetDCEx
RegisterClipboardFormatW
GetMenuStringW
GetSubMenu
GetMenuState
GetMenuItemID
GetMenuItemCount
AppendMenuW
DeleteMenu
CreatePopupMenu
CreateMenu
DrawEdge
FillRect
LoadBitmapW
CopyRect
SetRect
GetSystemMetrics
SendMessageW
GetClassNameW
EnableWindow
PostMessageW
GetParent
GetWindowRect
MapDialogRect
gdi32
SetBkColor
SetBkMode
GetCurrentObject
GetClipBox
SetPolyFillMode
SetROP2
SetStretchBltMode
SetMapMode
ExcludeClipRect
IntersectClipRect
SetTextAlign
GetViewportExtEx
GetWindowExtEx
StartDocW
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
CreatePolygonRgn
MoveToEx
CreatePatternBrush
GetCharWidthW
StretchDIBits
CreateEllipticRgn
StartPage
EndPage
SetAbortProc
AbortDoc
EndDoc
GetViewportOrgEx
EnumFontFamiliesExW
GetNearestColor
GetPolyFillMode
GetROP2
GetStretchBltMode
GetTextAlign
GetTextFaceW
GetTextExtentPoint32A
GetWindowOrgEx
GetCurrentPositionEx
SaveDC
RestoreDC
GetStockObject
GetTextColor
SetTextColor
GetTextMetricsW
LineTo
SetTextJustification
CreateDCW
ExtFloodFill
SelectClipRgn
CombineRgn
SetRectRgn
CreateRectRgnIndirect
CreateBitmap
CreateRectRgn
SelectPalette
CreateBitmapIndirect
GetDIBColorTable
ResizePalette
SetPaletteEntries
GetPaletteEntries
CreateHalftonePalette
CreatePalette
GetBitmapBits
Polygon
PatBlt
Rectangle
Ellipse
GetBkMode
GetDeviceCaps
CreateCompatibleDC
GetObjectW
CreateCompatibleBitmap
CreateFontIndirectW
CreateSolidBrush
CreatePen
StretchBlt
LPtoDP
DPtoLP
GetMapMode
GetBkColor
RealizePalette
CreateFontW
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
CreateDIBSection
SelectObject
DeleteObject
DeleteDC
GetTextExtentPoint32W
SetPixel
GetPixel
BitBlt
FillRgn
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
GetJobW
advapi32
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyW
RegDeleteValueW
GetFileSecurityW
SetFileSecurityW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegSetValueW
RegOpenKeyExA
RegQueryValueExA
LookupPrivilegeValueW
AdjustTokenPrivileges
ImpersonateSelf
OpenThreadToken
RegCloseKey
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegQueryValueW
RegSetValueExW
RegCreateKeyExW
shell32
SHGetFileInfoW
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
DragFinish
ExtractIconW
SHGetMalloc
DragQueryFileW
comctl32
InitCommonControlsEx
ord17
shlwapi
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
PathIsUNCW
ole32
CreateStreamOnHGlobal
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
oleaut32
VariantClear
VariantInit
VariantChangeType
SysAllocStringLen
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 580KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 236KB - Virtual size: 567KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 739KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ