Static task
static1
Behavioral task
behavioral1
Sample
8f14736dfc3c42daf2fb488bd7841bd4_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8f14736dfc3c42daf2fb488bd7841bd4_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
8f14736dfc3c42daf2fb488bd7841bd4_icedid_JC.exe
-
Size
1.4MB
-
MD5
8f14736dfc3c42daf2fb488bd7841bd4
-
SHA1
ea6d56e3e9964b8f828cd8b6fd9cde7c102e4794
-
SHA256
489f7734fd4a0b0054cf0fb49bd1750a38f04807f824833ca894df77d1f690e3
-
SHA512
30f3efd445a3d1ffc101594350ed30f516dfa7c249fdf0389574006be63fc7762dd8132199336515d65020902050922fb929049f72baf757dde1081e4141a6f5
-
SSDEEP
24576:rmcBOiKRxKG0ldAbwIV5xAJTSPdiW+uhhe2i:rt1RlqbZMJTSCCheT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8f14736dfc3c42daf2fb488bd7841bd4_icedid_JC.exe
Files
-
8f14736dfc3c42daf2fb488bd7841bd4_icedid_JC.exe.exe windows x86
5b8894de3877a48ee2e6b0b294cd72d4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
ExitProcess
RaiseException
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetTimeZoneInformation
GetACP
SetHandleCount
HeapFree
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
SetEnvironmentVariableA
GetTickCount
GetSystemTimeAsFileTime
SetErrorMode
FindNextFileA
GetOEMCP
GetCPInfo
GetFileTime
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
GetCurrentDirectoryA
WritePrivateProfileStringA
SetPriorityClass
DeviceIoControl
GetWindowsDirectoryA
lstrcpyA
CreateDirectoryA
RemoveDirectoryA
GetThreadLocale
InterlockedIncrement
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
FormatMessageA
LocalFree
MulDiv
GlobalAddAtomA
GlobalUnlock
FreeResource
GlobalFree
InterlockedDecrement
GetModuleFileNameW
SetLastError
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
ReleaseSemaphore
CreateSemaphoreA
TerminateProcess
OpenProcess
Sleep
CreateThread
TerminateThread
WaitForSingleObject
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersion
CompareStringA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
lstrlenA
CloseHandle
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
user32
UnregisterClassA
CharNextA
MoveWindow
SetWindowTextA
IsDialogMessageA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
CopyAcceleratorTableA
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
IntersectRect
IsIconic
GetWindowPlacement
GetMenuItemID
SetWindowsHookExA
CallNextHookEx
TranslateMessage
GetKeyState
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetMenuState
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
IsRectEmpty
InvalidateRgn
SetCapture
ReleaseCapture
GetNextDlgGroupItem
MessageBeep
UnhookWindowsHookEx
GetSysColorBrush
LoadCursorA
DestroyIcon
RegisterClipboardFormatA
DispatchMessageA
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
DestroyCursor
IsWindowEnabled
MessageBoxA
GetSystemMetrics
GetSysColor
GetMenuStringA
SystemParametersInfoA
DestroyMenu
PostQuitMessage
InsertMenuA
GetMessageA
PeekMessageA
GetCursorPos
EnableMenuItem
ModifyMenuA
GetSubMenu
PtInRect
RegisterHotKey
UnregisterHotKey
SetForegroundWindow
ShowOwnedPopups
ShowWindow
GetWindowRect
IsWindowVisible
ReleaseDC
GetDC
SetRect
GetParent
KillTimer
SetTimer
PostMessageA
SendMessageA
PostThreadMessageA
SetMenuItemInfoA
GetMenuItemCount
OffsetRect
InflateRect
EnableWindow
CopyRect
SetCursor
InvalidateRect
SetWindowRgn
GetClientRect
CharUpperA
LoadMenuA
EqualRect
gdi32
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePen
CreateRectRgnIndirect
CombineRgn
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
GetTextMetricsA
MoveToEx
LineTo
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
SelectClipPath
GetClipRgn
SelectClipRgn
GetStockObject
Rectangle
FillPath
GetCurrentObject
CreateCompatibleBitmap
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateBitmap
ExtTextOutA
CreateCompatibleDC
CreateFontIndirectA
GetObjectA
GetPixel
GetTextExtentPoint32A
CreateRectRgn
CreateEllipticRgn
DeleteObject
FrameRgn
CreateSolidBrush
FillRgn
PathToRegion
EndPath
BeginPath
PtInRegion
BitBlt
CreateRoundRectRgn
msimg32
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegEnumKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
DragFinish
ShellExecuteA
DragQueryFileA
comctl32
_TrackMouseEvent
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
oleaut32
SysAllocString
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantClear
SysFreeString
SysAllocStringLen
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
VariantCopy
ws2_32
WSACleanup
WSAStartup
getsockopt
__WSAFDIsSet
select
ioctlsocket
connect
setsockopt
socket
htons
gethostbyname
recv
send
closesocket
WSAAsyncSelect
dbghelp
MiniDumpWriteDump
wininet
InternetQueryDataAvailable
HttpOpenRequestA
InternetOpenUrlA
InternetConnectA
HttpSendRequestExA
HttpEndRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
netapi32
Netbios
snmpapi
SnmpUtilOidCpy
Sections
.text Size: 640KB - Virtual size: 636KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 508KB - Virtual size: 504KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ