Static task
static1
Behavioral task
behavioral1
Sample
a0cfe51198970897c0a3363bae49eda1_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a0cfe51198970897c0a3363bae49eda1_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
a0cfe51198970897c0a3363bae49eda1_icedid_JC.exe
-
Size
328KB
-
MD5
a0cfe51198970897c0a3363bae49eda1
-
SHA1
24e3b9e6bf2b87352dafe11612b9d39f674cffd6
-
SHA256
124c93fd6117f77150aa97d207821b37a3e377b078986f9402a05d512ce66fa0
-
SHA512
c6ea819c25136489ee23c2cd27f176d3644ce2aa26ae4eed0062c3978d1285d6aeb87830a7e909fe274f7b698c98ec0551966b590b97b4198619f2310fc9948e
-
SSDEEP
6144:E/DQed14Tov/0hgo67Pd6GdzvUgdqBAXt7NotZIZA:E/DQedlto6p68vq6d7aIO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0cfe51198970897c0a3363bae49eda1_icedid_JC.exe
Files
-
a0cfe51198970897c0a3363bae49eda1_icedid_JC.exe.exe windows x86
c7d42fe7196d5d37016bf6727d3cbc11
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
GetStringTypeA
LCMapStringA
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
HeapSize
CreateThread
GetVersionExA
ExitThread
HeapReAlloc
GetStartupInfoA
TerminateProcess
ExitProcess
GetSystemTimeAsFileTime
VirtualQuery
GetSystemInfo
VirtualAlloc
HeapAlloc
HeapFree
RtlUnwind
GetFileTime
FileTimeToLocalFileTime
SetErrorMode
FileTimeToSystemTime
RaiseException
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
FindResourceExA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
SuspendThread
ResumeThread
SetThreadPriority
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
SetLastError
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
FreeLibrary
VirtualProtect
GlobalFree
CreateEventA
GetLocalTime
SetConsoleCtrlHandler
GetSystemDirectoryA
MoveFileExA
MoveFileA
GetPrivateProfileIntA
GetPrivateProfileStringA
FindFirstFileA
FindNextFileA
FindClose
InterlockedDecrement
GetFileAttributesA
SetFileAttributesA
DeleteFileA
CopyFileA
WritePrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
LoadLibraryA
GetProcAddress
GetWindowsDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateDirectoryA
FormatMessageA
LocalFree
ResetEvent
SetEvent
lstrcpyA
Sleep
GetTickCount
GetCommandLineA
ExpandEnvironmentStringsA
GetCurrentProcess
CloseHandle
lstrcpynA
lstrlenA
lstrcmpiA
CompareStringA
CompareStringW
GetLastError
MultiByteToWideChar
GetVersion
LoadResource
LockResource
SizeofResource
FindResourceA
WideCharToMultiByte
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetStringTypeW
user32
LoadCursorA
GetSysColorBrush
DestroyMenu
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
MapDialogRect
GetAsyncKeyState
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
CharUpperA
EnableWindow
SetRectEmpty
GetWindowRect
InvalidateRect
SetTimer
KillTimer
SendMessageA
GetActiveWindow
FindWindowA
SetForegroundWindow
RegisterWindowMessageA
WinHelpA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
GetSubMenu
SetDlgItemTextA
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
GetParent
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetClassLongA
AppendMenuA
GetSystemMenu
LoadIconA
GetSysColor
FillRect
GetClientRect
wsprintfA
ExitWindowsEx
ScreenToClient
PostQuitMessage
MessageBeep
SetActiveWindow
GetCapture
IsWindowEnabled
GetWindow
PtInRect
CopyRect
GetSystemMetrics
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetMenuState
gdi32
EnumFontFamiliesExA
Escape
CreateSolidBrush
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
GetDeviceCaps
SaveDC
RestoreDC
SetBkMode
SelectObject
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenSCManagerA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
RegRestoreKeyA
RegReplaceKeyA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
ControlService
DeleteService
OpenServiceA
QueryServiceStatus
ChangeServiceConfigA
CreateServiceA
StartServiceA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegCreateKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegSetValueExA
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
LookupAccountNameA
RegSaveKeyA
RegQueryValueExA
comctl32
ord17
DestroyPropertySheetPage
CreatePropertySheetPageA
PropertySheetA
ole32
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
VariantClear
VariantChangeType
VariantInit
SysAllocString
shlwimp
_PathIsUNCA@4
_PathFindExtensionA@4
_PathStripToRootA@4
_PathFindFileNameA@4
Sections
.text Size: 184KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ