Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_251d2231285c8d7c6262b18f7ed302e8_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_251d2231285c8d7c6262b18f7ed302e8_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_251d2231285c8d7c6262b18f7ed302e8_icedid_JC.exe
-
Size
588KB
-
MD5
251d2231285c8d7c6262b18f7ed302e8
-
SHA1
aea873ac1445785e5ebd687dc18b9e42bb3befda
-
SHA256
cc66e7d626126a49696ed618bc3008992c82ff14d7a6c7b62886d26568b0e30d
-
SHA512
fb90e501a0b1de4c8ef4f0c88fc9ed9a94ba755078d4b14e90f10f756aa822cb9f50ab01f0ca316d7aa61b342346d62cb590b06f16a8d234e62339489d21721e
-
SSDEEP
6144:PvEuTT1PbqL7jBS0XJczrwB72gGQwy+YFhs5J6SPVdZkA8dKG13GRAOpXZqvn:Xh1PbqVS0KwB7FJwyNjPOVnjp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_251d2231285c8d7c6262b18f7ed302e8_icedid_JC.exe
Files
-
2023-08-22_251d2231285c8d7c6262b18f7ed302e8_icedid_JC.exe.exe windows x86
3dd97302348cd34c0b4f50a31c72a83c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawCreateEx
dinput
DirectInputCreateEx
dsound
ord1
kernel32
Sleep
GetTickCount
CloseHandle
DeviceIoControl
ReadFile
WriteFile
SetFilePointer
CreateFileA
OutputDebugStringA
GetModuleHandleA
FindNextFileA
GetModuleFileNameA
FindFirstFileA
GetVersion
GetVersionExA
DeleteCriticalSection
CompareStringA
GetThreadLocale
lstrcmpiA
GetLastError
InterlockedExchange
RaiseException
MultiByteToWideChar
GetACP
CompareStringW
WideCharToMultiByte
InitializeCriticalSection
GetLocaleInfoA
lstrlenA
IsBadCodePtr
IsBadReadPtr
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetTimeZoneInformation
GetFileType
SizeofResource
LockResource
LoadResource
FindResourceA
VirtualProtect
GlobalFree
lstrcpynA
SetLastError
FreeResource
GlobalUnlock
GlobalLock
LocalFree
FormatMessageA
GlobalAlloc
MulDiv
GetProcAddress
lstrcmpW
lstrcatA
FreeLibrary
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
InterlockedDecrement
lstrcpyA
EnumResourceLanguagesA
ConvertDefaultLocale
lstrcmpA
GetCurrentThread
ResumeThread
FindResourceExA
LeaveCriticalSection
EnterCriticalSection
GlobalFlags
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
GetCurrentDirectoryA
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
SetErrorMode
HeapFree
HeapAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
CreateThread
SetEnvironmentVariableA
SetCurrentDirectoryA
GetLocalTime
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
ExitProcess
RtlUnwind
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
SetHandleCount
GetStdHandle
user32
GetMenuItemID
GetWindow
PtInRect
CopyRect
GetWindowPlacement
SystemParametersInfoA
SetWindowLongA
CallWindowProcA
GetDlgCtrlID
RegisterClassA
GetClassInfoA
ScreenToClient
AdjustWindowRectEx
GetSysColor
GetMenu
IsWindowVisible
SetForegroundWindow
GetScrollPos
SetScrollPos
MessageBoxA
MapWindowPoints
GetMessagePos
GetMessageTime
UnhookWindowsHookEx
GetTopWindow
GetLastActivePopup
GetForegroundWindow
GetWindowTextA
SendDlgItemMessageA
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassInfoExA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
WinHelpA
RegisterWindowMessageA
IsDialogMessageA
SetWindowTextA
MoveWindow
wsprintfA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
GetDC
ReleaseDC
GetMenuItemCount
BeginPaint
EndPaint
PostQuitMessage
EndDialog
ValidateRect
TranslateMessage
GetMessageA
GetSysColorBrush
DestroyMenu
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
MapDialogRect
GetCapture
GetActiveWindow
SetActiveWindow
GetAsyncKeyState
GetFocus
SetFocus
PostMessageA
IsWindowEnabled
GetDlgItem
GetParent
GetWindowLongA
EnableWindow
UnregisterClassA
SendMessageA
DrawIcon
LoadIconA
GetWindowRect
GetSystemMetrics
GetClientRect
IsIconic
LoadImageA
GetDesktopWindow
SetCursor
GetSubMenu
CreateDialogIndirectParamA
IsWindow
GetNextDlgTabItem
SetWindowPos
SetRect
FillRect
DestroyWindow
LoadCursorA
UpdateWindow
DispatchMessageA
ShowWindow
DefWindowProcA
PeekMessageA
CreateWindowExA
ShowCursor
RegisterClassExA
GetCursorPos
GetKeyState
SetCursorPos
gdi32
PtVisible
RectVisible
TextOutA
EnumFontFamiliesExA
GetStockObject
DeleteDC
BitBlt
CreateSolidBrush
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateCompatibleDC
DeleteObject
Escape
ExtTextOutA
CreateBitmap
comdlg32
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
comctl32
ord17
DestroyPropertySheetPage
CreatePropertySheetPageA
PropertySheetA
shlwapi
PathFindExtensionA
PathFindFileNameA
ole32
CoInitialize
CoUninitialize
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 6.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ