Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_5da94a7a52b9a428374d4a24c63687f2_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_5da94a7a52b9a428374d4a24c63687f2_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_5da94a7a52b9a428374d4a24c63687f2_icedid_JC.exe
-
Size
684KB
-
MD5
5da94a7a52b9a428374d4a24c63687f2
-
SHA1
68ee586106919181e58c6986563e4ed477f87e50
-
SHA256
18c686c26d355da82673a9fc485286f9b2a3268da58630a2ffe880144f3aaa4d
-
SHA512
a52baaf0825d8cdd17bcfe8520521f05431f56964675ef388fc45dc5a2dd068b9e00c7bec8f2ca78e706ebcadcef1e8c366150e6b43749dfed8483c2a3d500ff
-
SSDEEP
12288:mn8HgwOxvXTggqcH3U4Puq+CPS9GsVmQLXq9zU:mn8A/wcKpGs3i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_5da94a7a52b9a428374d4a24c63687f2_icedid_JC.exe
Files
-
2023-08-22_5da94a7a52b9a428374d4a24c63687f2_icedid_JC.exe.exe windows x86
d5b284b8f33592448e994397799a1786
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
GetLocalTime
TerminateProcess
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetFullPathNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetDriveTypeA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetExitCodeProcess
CreateProcessA
SetEnvironmentVariableA
GetVolumeInformationA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GlobalFlags
InterlockedIncrement
GetCurrentDirectoryA
WritePrivateProfileStringA
GetFileAttributesA
CreateFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTempPathA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
WaitForSingleObject
GlobalAddAtomA
InterlockedDecrement
MulDiv
FormatMessageA
lstrcpynA
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThreadId
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryExA
FindResourceExA
GetUserDefaultLangID
GetModuleHandleA
GetWindowsDirectoryA
GetSystemDirectoryA
SetLastError
FindNextFileA
CreateDirectoryA
RemoveDirectoryA
Sleep
FindClose
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentThread
GetCurrentProcess
LocalAlloc
LocalFree
CloseHandle
GetModuleFileNameA
FindFirstFileA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
GetLongPathNameA
DeleteFileA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetEnvironmentStrings
InterlockedExchange
user32
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
BeginPaint
EndPaint
GetSysColorBrush
LoadCursorA
GetKeyState
PeekMessageA
DestroyMenu
GetCursorPos
ValidateRect
GetLastActivePopup
SetCursor
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
PostMessageA
PostQuitMessage
MessageBoxA
LoadStringA
CharUpperA
GetSystemMetrics
LoadIconA
EnableWindow
GetClientRect
IsIconic
SendMessageA
DrawIcon
GetClassInfoA
gdi32
TextOutA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
RectVisible
PtVisible
DeleteObject
SetMapMode
GetDeviceCaps
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
GetObjectA
SaveDC
RestoreDC
ExtTextOutA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
SetSecurityDescriptorGroup
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
ImpersonateSelf
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
FreeSid
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RevertToSelf
shell32
ShellExecuteA
SHChangeNotify
SHGetSpecialFolderPathA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoInitialize
CoCreateInstance
oleaut32
VariantClear
VariantChangeType
VariantInit
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 500KB - Virtual size: 497KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ