Behavioral task
behavioral1
Sample
3e8e223b94de1ee766d3bd8e1bad68a7_icedid_JC.exe
Resource
win7-20230712-en
General
-
Target
3e8e223b94de1ee766d3bd8e1bad68a7_icedid_JC.exe
-
Size
5.0MB
-
MD5
3e8e223b94de1ee766d3bd8e1bad68a7
-
SHA1
b239de55ce8455c62ac5bfc6a1665c221ee336a1
-
SHA256
1591e63e4e9fdf415cc8f85945a3e51169768055ada39f4cf8e9d4f71431c3d3
-
SHA512
ce45e7be65e72bbb4ade1324a51f045c7521a7927a3dbf7de3e7d86f2b1cff641929a199f881997ecb9ee832d7369b0f06495c1c9aa9bb39754cbca3604c4ca6
-
SSDEEP
49152:jwbVU4hwhtpaGADCjSkAl21ucvDgYGERUAhZjNGlY+/bM/dPy+cT/8ks22urn7gN:sbO4YiPDC+kAEYcvDXGsUgG1/Q/g+Ze
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e8e223b94de1ee766d3bd8e1bad68a7_icedid_JC.exe
Files
-
3e8e223b94de1ee766d3bd8e1bad68a7_icedid_JC.exe.exe windows x86
171e86acd90c8e364c75b1a37656677d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
GetVersionExA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
GetCommandLineA
MoveFileA
SetFileAttributesA
GetStartupInfoA
FormatMessageA
GetUserDefaultLCID
GetLocalTime
FindFirstFileA
FindNextFileA
GetTickCount
GetFileSize
ReadFile
CreateDirectoryA
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileStringA
IsBadReadPtr
HeapReAlloc
ExitProcess
lstrcmpiW
lstrcmpW
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
RtlZeroMemory
VirtualFree
HeapAlloc
HeapFree
GetProcessHeap
VirtualAlloc
lstrcpyA
IsBadCodePtr
LoadLibraryW
GetModuleHandleW
FreeLibrary
LoadLibraryA
DeleteFileA
VirtualFreeEx
CreateRemoteThread
WriteFile
CreateDirectoryW
GetFileAttributesW
SetEndOfFile
SetFilePointer
GetLastError
CreateFileA
SetWaitableTimer
CreateWaitableTimerA
QueryDosDeviceW
Process32First
WideCharToMultiByte
lstrlenW
FindClose
FindFirstFileW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetCurrentProcess
lstrlenA
TerminateThread
CreateThread
MultiByteToWideChar
GetCurrentProcessId
TerminateProcess
GetEnvironmentVariableA
WaitForSingleObject
ResumeThread
SetThreadContext
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
GetThreadContext
CreateProcessA
RtlMoveMemory
LocalSize
Process32Next
CreateToolhelp32Snapshot
GetProcAddress
GetModuleHandleA
CloseHandle
LocalFree
LocalAlloc
OpenProcess
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
Sleep
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
DeleteCriticalSection
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
MulDiv
FlushFileBuffers
lstrcpynA
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
user32
SendDlgItemMessageA
IsDialogMessageA
SetFocus
GetWindowPlacement
IsIconic
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
UnregisterClassA
PostThreadMessageA
DestroyMenu
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
PostMessageA
PostQuitMessage
SetWindowTextA
GetWindow
PtInRect
GetWindowLongA
GetWindowTextA
GetMenuItemCount
GetDlgCtrlID
EndDialog
CreateDialogIndirectParamA
DestroyWindow
UnhookWindowsHookEx
MsgWaitForMultipleObjects
SetWindowPos
SetForegroundWindow
FindWindowExA
PostMessageW
SendMessageA
GetWindowThreadProcessId
GetWindowTextLengthW
GetWindowTextW
LoadCursorA
SetCursor
RegisterWindowMessageA
FindWindowA
CallWindowProcA
IsWindow
SetWindowLongA
CreateIconFromResource
SetPropA
GetPropA
GetClientRect
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
CloseClipboard
SetClipboardData
GrayStringA
DrawTextA
TabbedTextOutA
GetCursorPos
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
EmptyClipboard
OpenClipboard
ClientToScreen
IsWindowVisible
LoadBitmapA
RegisterClipboardFormatA
EnableWindow
GetParent
IsWindowEnabled
GetForegroundWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
GetWindowRect
GetClassNameA
ReleaseDC
GetDC
advapi32
RegOpenKeyExA
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegCloseKey
RegQueryValueExA
RegOpenKeyA
CryptAcquireContextA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderPathA
Shell_NotifyIconA
ShellExecuteA
ole32
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
OleRun
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
OleInitialize
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
shlwapi
PathIsDirectoryW
PathIsURLA
StrToIntExW
StrToIntW
PathFileExistsA
gdi32
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteDC
GetStockObject
GetObjectA
SelectObject
GetDeviceCaps
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
wininet
InternetSetOptionA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetOpenUrlA
InternetGetConnectedState
InternetSetCookieA
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
gdiplus
GdipGetImageHeight
GdiplusShutdown
GdipDisposeImage
GdipGetImageWidth
GdipLoadImageFromStream
GdipLoadImageFromFile
GdiplusStartup
psapi
GetProcessImageFileNameW
oledlg
ord8
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroyDescriptor
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SafeArrayDestroy
SysFreeString
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
VarR8FromCy
ws2_32
send
closesocket
select
WSACleanup
WSAStartup
recv
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ord17
rasapi32
RasGetConnectStatusA
RasHangUpA
Sections
.text Size: 780KB - Virtual size: 777KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.2MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE