Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_4d17c9027c4d3f588426f1152837bc81_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_4d17c9027c4d3f588426f1152837bc81_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_4d17c9027c4d3f588426f1152837bc81_icedid_JC.exe
-
Size
372KB
-
MD5
4d17c9027c4d3f588426f1152837bc81
-
SHA1
27bb11fc91ceeabf87a9c60689efeb774633d242
-
SHA256
e45db719cad244a40d2a31f7e3df813d36fffbed90e3b0ee14e8199ed3ecbf3b
-
SHA512
ca5a1ce053a6d5548645fff90316d53a21b8cc788b771f38c60c1bb660e44899d7146b34b79b2b127f65956d3ab7f44a85e80d54eebea083d4a581ad9b55ed04
-
SSDEEP
6144:JnhvczlOuARYKcynEHZTsRSZ0K7bMaEVGN9dXKW1qTk/RG6v:Jn1czEuhOnEHKR41se9lZ1Bc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_4d17c9027c4d3f588426f1152837bc81_icedid_JC.exe
Files
-
2023-08-22_4d17c9027c4d3f588426f1152837bc81_icedid_JC.exe.exe windows x86
5b1488c7997cfa97b172d729e488d105
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
sahookdll
UnregisterHookEvent
RegisterHookEvent
UninstallHook
InstallHook
kernel32
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
TerminateProcess
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapFree
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetUnhandledExceptionFilter
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
HeapAlloc
RtlUnwind
ExitProcess
SetErrorMode
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
LocalFileTimeToFileTime
GetShortPathNameA
CreateFileA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
FindFirstFileA
FindClose
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
RaiseException
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
InterlockedIncrement
FreeResource
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
GetModuleHandleA
GetProcAddress
GlobalGetAtomNameA
GlobalAddAtomA
GetModuleFileNameA
SystemTimeToFileTime
WaitForSingleObject
GetCurrentThreadId
CloseHandle
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
LocalAlloc
FreeLibrary
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
GetCommandLineW
GetStringTypeExA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
lstrlenW
GetTickCount
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapDestroy
user32
GetDCEx
LockWindowUpdate
SetParent
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetSysColorBrush
LoadCursorA
KillTimer
SetTimer
ClientToScreen
SetWindowRgn
DrawIcon
FillRect
FindWindowA
RegisterClipboardFormatA
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
PostQuitMessage
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetCapture
InvalidateRgn
ReleaseDC
GetDC
CopyAcceleratorTableA
SetRect
IsRectEmpty
IsZoomed
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
MoveWindow
SetWindowTextA
IsDialogMessageA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsChild
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
PostThreadMessageA
TrackPopupMenu
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
ScreenToClient
DeferWindowPos
GetScrollInfo
SetScrollInfo
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
PtInRect
MessageBoxA
RegisterWindowMessageA
wsprintfA
LoadMenuA
GetClassNameA
GetSysColor
SetWindowPos
WinHelpA
SetFocus
GetFocus
EqualRect
GetDlgItem
SetWindowLongA
GetDlgCtrlID
GetMenu
UnpackDDElParam
ReuseDDElParam
LoadIconA
GetClassInfoA
SetCursor
GetCapture
ReleaseCapture
LoadAcceleratorsA
GetParent
SetActiveWindow
InvalidateRect
IsIconic
InsertMenuItemA
CreatePopupMenu
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
GetLastActivePopup
BringWindowToTop
SetMenu
ShowWindow
GetWindowLongA
GetWindow
IsWindowEnabled
MessageBeep
GetNextDlgGroupItem
DestroyIcon
WindowFromPoint
TranslateAcceleratorA
IsWindow
AdjustWindowRectEx
GetClientRect
GetWindowTextLengthA
GetWindowTextA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetMenuItemInfoA
InflateRect
ScrollWindow
CharNextA
IsWindowVisible
SendMessageA
PeekMessageA
GetCursorPos
ValidateRect
UnhookWindowsHookEx
GetDesktopWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowRect
PostMessageA
GetKeyState
EnableWindow
UpdateWindow
CharUpperA
DestroyMenu
UnregisterHotKey
RegisterHotKey
SetScrollRange
gdi32
GetStockObject
CreateSolidBrush
GetBkColor
GetTextColor
CreateFontIndirectA
PatBlt
SetRectRgn
CombineRgn
GetMapMode
CreatePatternBrush
BitBlt
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
GetPixel
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateCompatibleDC
CreateCompatibleBitmap
GetDeviceCaps
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
DeleteObject
Ellipse
LPtoDP
CreateEllipticRgn
GetRgnBox
CreateRectRgnIndirect
GetTextExtentPoint32A
GetTextMetricsA
SelectObject
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegSetValueA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
SetFileSecurityA
GetFileSecurityA
RegCreateKeyA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
shell32
DragFinish
DragQueryFileA
SHGetFileInfoA
ExtractIconA
CommandLineToArgvW
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromString
CoRevokeClassObject
CoTaskMemFree
CoTaskMemAlloc
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoDisconnectObject
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
oleaut32
LoadTypeLi
OleCreateFontIndirect
VariantInit
SysAllocString
SystemTimeToVariantTime
SafeArrayDestroy
VariantClear
VariantCopy
VariantChangeType
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocStringByteLen
SysStringLen
SysAllocStringLen
SysFreeString
urlmon
ObtainUserAgentString
wininet
HttpOpenRequestA
InternetConnectA
HttpSendRequestExA
HttpEndRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
InternetQueryDataAvailable
Sections
.text Size: 240KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ