Static task
static1
Behavioral task
behavioral1
Sample
e7c786dd897ed8dda394f7f06eb48b59_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e7c786dd897ed8dda394f7f06eb48b59_icedid_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
e7c786dd897ed8dda394f7f06eb48b59_icedid_JC.exe
-
Size
1.4MB
-
MD5
e7c786dd897ed8dda394f7f06eb48b59
-
SHA1
5029a3c408b53f63bf0d1b23ff417a7dd318bca9
-
SHA256
54f6be913f6a9931d06798cbb3be841f3420c34def645b94d8c8bd52fc24b7c1
-
SHA512
f4b92ee7e0096d8c6a8b47b1465c6b0922b839ac8f13fc8e5932b00e30ab4e0a4f28cb9f522f41941a096df688e4836cc282dd1da8c08447e7dc73f4c478f974
-
SSDEEP
24576:X+XwpZFF9BQ1KitOibXsS6bAN9Tn3GvGPYK9O9:hZB3itXXsF0TVQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e7c786dd897ed8dda394f7f06eb48b59_icedid_JC.exe
Files
-
e7c786dd897ed8dda394f7f06eb48b59_icedid_JC.exe.exe windows x86
4d9e85ea20c952ebaecacd6b7746b125
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
WritePrivateProfileStringA
GetTickCount
SetErrorMode
RtlUnwind
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
ExitProcess
SetEnvironmentVariableA
SetCurrentDirectoryA
ExitThread
CreateThread
CreateDirectoryA
GetCommandLineA
GetStartupInfoA
GetTimeZoneInformation
RaiseException
HeapSize
GetFullPathNameA
GetFileType
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
SetHandleCount
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
GetExitCodeProcess
CreateProcessA
GetConsoleOutputCP
WriteConsoleW
GetFileTime
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetThreadLocale
LocalAlloc
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetModuleFileNameW
FreeResource
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
lstrcpynW
lstrcpynA
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
GetOverlappedResult
GetSystemTimeAsFileTime
GetThreadContext
GetCurrentDirectoryA
GetVersionExA
GetFileAttributesA
FreeLibrary
GetCurrentProcessId
GetCurrentThread
SetUnhandledExceptionFilter
GlobalMemoryStatusEx
ResumeThread
SuspendThread
TerminateThread
QueryPerformanceFrequency
QueryPerformanceCounter
FileTimeToLocalFileTime
GetFileSize
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetProcessHeap
HeapAlloc
HeapFree
ReadProcessMemory
GetVolumePathNamesForVolumeNameW
CreateFileW
DeviceIoControl
GetCurrentProcess
GetComputerNameA
SearchPathW
ExpandEnvironmentStringsW
GetWindowsDirectoryW
GetLongPathNameW
FileTimeToSystemTime
FindFirstFileW
FindNextFileW
GetLogicalDrives
GetDriveTypeA
MulDiv
CreateMutexA
MoveFileExA
RemoveDirectoryA
GetTempPathA
GetWindowsDirectoryA
GetSystemInfo
FindFirstFileA
FindNextFileA
FindClose
CreateEventA
WaitForSingleObject
SetEvent
ResetEvent
InterlockedDecrement
InterlockedIncrement
GetModuleFileNameA
AttachConsole
GetStdHandle
WriteConsoleA
FreeConsole
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
GetEnvironmentVariableW
GetEnvironmentVariableA
lstrlenA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
Sleep
OpenProcess
CloseHandle
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
lstrlenW
DeleteFileA
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetStdHandle
InitializeCriticalSection
user32
InvalidateRgn
SetRect
CopyAcceleratorTableA
UnregisterClassA
GetSysColorBrush
SetRectEmpty
SetWindowRgn
IsRectEmpty
DestroyMenu
GetMenuItemInfoA
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
GetMessageA
ValidateRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
ShowScrollBar
UpdateWindow
GetMenu
MessageBoxA
CreateWindowExA
TranslateAcceleratorA
GetClassInfoA
RegisterClassA
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
GetKeyState
SetWindowPos
WindowFromPoint
ScreenToClient
GetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
FillRect
SystemParametersInfoA
SetScrollPos
GetScrollPos
SetWindowLongA
SetCursor
LoadCursorA
SetParent
DrawEdge
GetCursorPos
CreatePopupMenu
CopyRect
GetSysColor
DrawIconEx
DestroyIcon
GetDesktopWindow
GetTabbedTextExtentA
ReleaseDC
GetDC
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
ShowWindow
GetWindow
ReleaseCapture
SetCapture
WindowFromDC
PtInRect
GetWindowLongA
AdjustWindowRectEx
wsprintfW
DrawTextA
SetMenu
BringWindowToTop
InsertMenuItemA
LoadAcceleratorsA
LoadMenuA
ReuseDDElParam
PostThreadMessageA
RegisterClipboardFormatA
SendInput
GetSystemMetrics
MessageBeep
GetNextDlgGroupItem
CharNextA
GetClassInfoExA
UnpackDDElParam
PostQuitMessage
LoadIconA
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
LoadBitmapA
CharUpperA
FindWindowExA
SetFocus
GetWindowThreadProcessId
WaitForInputIdle
SetForegroundWindow
FindWindowA
IsZoomed
GetFocus
RedrawWindow
InvalidateRect
KillTimer
SendMessageA
EnumThreadWindows
IsWindowVisible
IsWindowEnabled
SetTimer
PostMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
IsWindow
SetActiveWindow
GetParent
OffsetRect
EnableWindow
GetClientRect
GetWindowRect
InflateRect
IntersectRect
gdi32
GetMapMode
CreateEllipticRgn
LPtoDP
Ellipse
GetRgnBox
GetTextColor
DeleteObject
CreatePen
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetBkColor
CreateFontIndirectA
MoveToEx
LineTo
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
Polygon
CreateRectRgnIndirect
DPtoLP
GetDeviceCaps
CreateSolidBrush
StretchBlt
TextOutW
SetPixel
GetPixel
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
GetTextExtentPoint32A
SelectObject
SetBitmapBits
CreateBitmap
GetStockObject
GetObjectA
msimg32
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
OpenProcessToken
RegQueryValueA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
GetUserNameA
OpenSCManagerW
EnumServicesStatusW
OpenServiceW
QueryServiceConfigW
QueryServiceConfig2W
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyExW
RegQueryValueExW
RegQueryInfoKeyA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatusEx
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderPathA
SHGetFolderPathW
ShellExecuteA
DragQueryFileA
DragFinish
comctl32
ImageList_LoadImageA
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoRegisterMessageFilter
OleFlushClipboard
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
oleaut32
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantChangeType
SysAllocStringByteLen
SysStringLen
SysAllocString
SysAllocStringLen
SafeArrayCreateVector
SysFreeString
SafeArrayAccessData
SafeArrayUnaccessData
VariantClear
SafeArrayDestroy
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeA
msi
ord217
ord173
mswsock
AcceptEx
GetAcceptExSockaddrs
ws2_32
select
send
setsockopt
closesocket
recv
shutdown
WSACleanup
WSAStartup
listen
bind
htons
socket
WSAGetLastError
WSASetLastError
connect
gethostbyname
inet_addr
wininet
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetQueryDataAvailable
InternetQueryOptionA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetOpenUrlA
Sections
.text Size: 756KB - Virtual size: 753KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 200KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 200KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 252KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ