Static task
static1
Behavioral task
behavioral1
Sample
8acffb35df2d17abd178249d7e6a4c88_icedid_JC.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
8acffb35df2d17abd178249d7e6a4c88_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
8acffb35df2d17abd178249d7e6a4c88_icedid_JC.exe
-
Size
2.1MB
-
MD5
8acffb35df2d17abd178249d7e6a4c88
-
SHA1
112595d2dc7ff6a55e8694388c04d90016f12b60
-
SHA256
511f73fb88a7ea3e840a92668f58ef80b38156e0098326df641a6c732bcf31a1
-
SHA512
393b2795c502ddb799b5bda6952521829c8e0916c7295798d5c64d15f49f56a95b08fff7185bd114b02178dc2b2b7ec7e7d4773bdfeb5b157d8d9d34a4898afa
-
SSDEEP
49152:vdFXLWwovrnnXsujBpKqdJCvm7pRr+vtrfY9VTZ:vHLWwGn8FqqqpR6lrfY/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8acffb35df2d17abd178249d7e6a4c88_icedid_JC.exe
Files
-
8acffb35df2d17abd178249d7e6a4c88_icedid_JC.exe.exe windows x86
a9dcd33427f82862d50d0f183d236075
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
HeapAlloc
RtlUnwind
HeapReAlloc
RaiseException
ExitProcess
HeapSize
VirtualAlloc
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
TerminateProcess
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
CreateFileA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
HeapFree
GetStartupInfoW
FindResourceW
GetTickCount
GetFileTime
GetFileSizeEx
GetFileAttributesW
SetFileTime
FileTimeToLocalFileTime
SetErrorMode
CreateFileW
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringW
FindResourceExW
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedCompareExchange
ExpandEnvironmentStringsA
DeleteFileA
MoveFileA
ResetEvent
CreateEventA
FindFirstFileA
GetFullPathNameA
FileTimeToSystemTime
GetThreadLocale
lstrlenA
GlobalFlags
SuspendThread
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
VirtualProtect
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GetThreadPriority
GlobalDeleteAtom
LoadLibraryW
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalAlloc
FormatMessageW
LocalFree
lstrlenW
MulDiv
GetModuleHandleA
FreeLibrary
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetCurrentProcessId
GetModuleFileNameW
QueryPerformanceFrequency
GetProcessAffinityMask
GetSystemInfo
MultiByteToWideChar
QueryPerformanceCounter
GetCurrentProcess
GlobalMemoryStatus
CreateDirectoryA
GetFileAttributesA
SetLastError
InterlockedDecrement
CreateThread
GetExitCodeThread
SetEvent
GetComputerNameW
LockResource
Sleep
ResumeThread
DeleteCriticalSection
CreateEventW
EnterCriticalSection
SetThreadPriority
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
CloseHandle
ReleaseMutex
CreateMutexA
GetProcAddress
GetLastError
GetModuleHandleW
GetLocaleInfoA
InterlockedExchange
GetVersionExW
SizeofResource
WideCharToMultiByte
LoadResource
GetConsoleCP
user32
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
CharUpperW
ReleaseCapture
SetCapture
DestroyMenu
LoadCursorW
GetSysColorBrush
GetMessageW
TranslateMessage
ValidateRect
SetWindowContextHelpId
SetCursor
PostQuitMessage
MapDialogRect
GetAsyncKeyState
ShowWindow
MoveWindow
IsDialogMessageW
SetDlgItemInt
GetDlgItemInt
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
GetPropW
RemovePropW
SetFocus
GetForegroundWindow
DispatchMessageW
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetMenu
IsWindowVisible
UpdateWindow
GetClientRect
PostMessageW
GetClassInfoExW
GetClassInfoW
AdjustWindowRectEx
EqualRect
PtInRect
GetMenu
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetMenuItemID
GetMenuItemCount
GetSysColor
EndPaint
BeginPaint
GetWindowDC
RegisterClipboardFormatW
ClientToScreen
GrayStringW
PostThreadMessageW
SetPropW
DrawTextExW
DrawTextW
TabbedTextOutW
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
GetSubMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
GetParent
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetDC
ReleaseDC
SetWindowLongW
RegisterDeviceNotificationW
UnregisterDeviceNotification
CallWindowProcW
GetActiveWindow
SetWindowTextA
DestroyWindow
UnregisterClassW
CreateWindowExW
RegisterClassW
DefWindowProcW
LoadIconW
SetForegroundWindow
FindWindowW
GetWindowTextW
EnumChildWindows
MessageBoxW
GetDlgCtrlID
SetWindowTextW
EnumDisplaySettingsW
GetSystemMetrics
ScreenToClient
GetWindowRect
WindowFromPoint
InvalidateRect
GetCursorPos
CopyRect
SetTimer
KillTimer
LoadBitmapW
SendMessageW
EnableWindow
PeekMessageW
gdi32
ExtTextOutW
CreateRectRgnIndirect
GetMapMode
EnumFontFamiliesExW
GetBkColor
GetTextColor
GetRgnBox
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetObjectW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
BitBlt
CreateCompatibleDC
CreateBitmap
GetDeviceCaps
StretchDIBits
Escape
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegDeleteKeyW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegEnumKeyW
RegOpenKeyW
RegSetValueExW
RegQueryValueW
RegCreateKeyExW
RegOpenKeyExW
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListW
ShellExecuteW
comctl32
ord17
shlwapi
PathFindFileNameW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoRegisterMessageFilter
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
SysStringLen
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
dsound
ord12
ord11
ord3
d3d8
Direct3DCreate8
winmm
timeGetTime
timeKillEvent
timeSetEvent
dinput8
DirectInput8Create
d3d9
Direct3DCreate9
ddraw
DirectDrawCreate
Sections
.text Size: 641KB - Virtual size: 640KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 10.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE