Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_0e256b031e6ce35cc76d9aeaad62a375_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_0e256b031e6ce35cc76d9aeaad62a375_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_0e256b031e6ce35cc76d9aeaad62a375_icedid_JC.exe
-
Size
7.1MB
-
MD5
0e256b031e6ce35cc76d9aeaad62a375
-
SHA1
264ff9667ab6a655d02ed2fd147d1665126c4f5b
-
SHA256
64ef25e223d05d9fe1d7b01c2a89e83d5f2f4c33c2312d7f8b51fb0e76d77b13
-
SHA512
4d1cbbe3999632a8194918d2f9e0ba6594a52af9059d1d5390fd5ca6025b26f7506fa5b0f38262883682b6bf6888887b5590f14039add8cf32c01849dd768a50
-
SSDEEP
196608:bmY+spXlO0nory2xahBEtnNx8KHf36Hv3MH1qec1j:vXlGyMqK/EQcR
Malware Config
Signatures
Files
-
2023-08-22_0e256b031e6ce35cc76d9aeaad62a375_icedid_JC.exe.exe windows x86
230363beee3a16b40f8fefab5ba42a93
Code Sign
20:8c:57:11:c6:af:ba:85:45:bc:a4:ef:e8:fa:a2:68Certificate
IssuerCN=SchulzeNot Before04/07/2023, 13:29Not After10/06/2123, 13:29SubjectCN=Schulze39:4c:25:e1:7c:a0:6d:27:a8:65:e2:3b:d9:1d:22:d4Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before03/05/2023, 00:00Not After02/08/2034, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #4,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
14:0b:56:72:b8:8d:88:dc:76:57:29:92:c8:f3:bf:ac:0d:02:04:99:ce:1b:37:a9:eb:1e:e5:80:14:ba:42:4eSigner
Actual PE Digest14:0b:56:72:b8:8d:88:dc:76:57:29:92:c8:f3:bf:ac:0d:02:04:99:ce:1b:37:a9:eb:1e:e5:80:14:ba:42:4eDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetModuleHandleW
SetErrorMode
WritePrivateProfileStringA
GlobalFlags
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
RtlUnwind
Sleep
ExitProcess
HeapFree
HeapAlloc
RaiseException
HeapReAlloc
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCommandLineA
GetStartupInfoA
VirtualAlloc
HeapSize
GetACP
IsValidCodePage
TerminateProcess
GlobalHandle
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStdHandle
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
HeapCreate
VirtualFree
CompareStringW
SetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetFileTime
GetFileSizeEx
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetCurrentProcessId
GlobalAddAtomA
FreeResource
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
CompareStringA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
LoadLibraryA
lstrcmpA
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MultiByteToWideChar
MulDiv
SetLastError
SetVolumeLabelA
GetCurrentDirectoryA
GetDiskFreeSpaceA
GetDriveTypeA
MoveFileA
CreateDirectoryA
GetFileSize
FormatMessageA
LocalFree
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetTempPathA
GetModuleFileNameA
lstrlenA
lstrcpyA
CreateProcessA
GetLastError
GetExitCodeProcess
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
InterlockedIncrement
FindNextFileA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileA
SetFilePointer
ReadFile
InterlockedExchange
CloseHandle
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
UnhandledExceptionFilter
SizeofResource
user32
UnregisterClassA
GetSysColorBrush
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
PtInRect
DefWindowProcA
CallWindowProcA
GetMenu
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowThreadProcessId
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetMessageA
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowTextA
PostQuitMessage
PeekMessageA
IsWindow
CharUpperA
GetFocus
GetParent
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
GetWindowLongA
IsDialogMessageA
DestroyMenu
AdjustWindowRectEx
SendMessageA
DrawIcon
PostMessageA
IsIconic
GetClientRect
LoadCursorA
LoadIconA
EnableWindow
GetSystemMetrics
SetCursor
DispatchMessageA
TranslateMessage
MsgWaitForMultipleObjects
wsprintfA
MessageBoxA
OemToCharBuffA
CharToOemBuffA
GetSubMenu
GetMenuItemCount
SendDlgItemMessageA
GetDlgItem
GetWindow
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
gdi32
DeleteDC
GetStockObject
SetWindowExtEx
ScaleWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
GetDeviceCaps
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
PtVisible
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
shell32
SHFileOperationA
shlwapi
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 253KB - Virtual size: 253KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ