Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_5ea684cd2b92ca57b37778e6293bda3e_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_5ea684cd2b92ca57b37778e6293bda3e_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_5ea684cd2b92ca57b37778e6293bda3e_icedid_JC.exe
-
Size
2.3MB
-
MD5
5ea684cd2b92ca57b37778e6293bda3e
-
SHA1
ab3ab6c668d2398810c4d1536b737c32c7b91169
-
SHA256
4c8b32b66d18ee1d0c9c797aa1dcb43933fcd451b376f2800df2fe11e197ed9c
-
SHA512
633779a8e3d46c05625ea1aa8e1d880797a4feaed16d0313ef6f0a3214e38adfc04f2e351d3b229692ee019a2a40575fddfa77dd66c7fc5d2f0fab50a10242d9
-
SSDEEP
49152:7mwm0ReEYd8zYvAbCjvQBvAbBivAbBOS/g72KPdHOhC:NeEYeCQmV0SY72KIC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_5ea684cd2b92ca57b37778e6293bda3e_icedid_JC.exe
Files
-
2023-08-22_5ea684cd2b92ca57b37778e6293bda3e_icedid_JC.exe.exe windows x86
e6a6a1e1fc89f7e89fc8fe34431b97b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetStartupInfoA
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
RtlUnwind
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
HeapFree
GetTickCount
GetFileSizeEx
FileTimeToLocalFileTime
SetErrorMode
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
FileTimeToSystemTime
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetModuleHandleW
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
GetModuleFileNameA
InterlockedDecrement
GetModuleFileNameW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
FreeResource
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
GetFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CreateDirectoryA
lstrcatA
lstrlenA
lstrcmpiA
GetFileAttributesA
lstrcpyA
GetTempPathA
GetVersionExA
GetCurrentProcess
Sleep
GetCommandLineA
DeleteFileA
GetWindowsDirectoryA
WriteFile
MulDiv
GetModuleHandleA
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
SetFilePointer
ReadFile
ResetEvent
WaitForSingleObject
FreeLibrary
LoadLibraryA
GetProcAddress
CreateEventA
CloseHandle
OutputDebugStringA
CreateFileA
GetLastError
DeviceIoControl
GetDriveTypeA
GetEnvironmentStrings
GetVersion
user32
RegisterClipboardFormatA
PostThreadMessageA
CharNextA
SetCapture
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
CharUpperA
SetWindowContextHelpId
MapDialogRect
SetCursor
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
SetWindowsHookExA
CallNextHookEx
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
RedrawWindow
ModifyMenuA
SetWindowLongA
GetWindowLongA
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
MessageBeep
InvalidateRgn
SetRect
IsRectEmpty
GetClassLongA
CopyAcceleratorTableA
LoadImageA
IsWindow
PostMessageA
GetClientRect
InvalidateRect
EnableWindow
SetTimer
KillTimer
SendMessageA
GetSysColor
DrawFocusRect
OffsetRect
WindowFromPoint
GetCursorPos
GetCapture
ClientToScreen
ReleaseCapture
GetNextDlgGroupItem
LoadBitmapA
DrawEdge
SetWindowRgn
GetDC
GetParent
GetSystemMetrics
ExitWindowsEx
DrawIcon
IsIconic
LoadIconA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
EndDialog
GetNextDlgTabItem
IsWindowEnabled
gdi32
GetStockObject
CreateSolidBrush
ExtSelectClipRgn
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetPixel
CreateCompatibleBitmap
CreateRectRgn
CombineRgn
SelectClipRgn
DeleteDC
Rectangle
GetDeviceCaps
CreateFontA
CreateRectRgnIndirect
StretchBlt
BitBlt
CreateCompatibleDC
SelectObject
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegOpenKeyExA
EqualSid
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
FreeSid
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
shell32
DragFinish
DragQueryFileA
comctl32
_TrackMouseEvent
ord17
shlwapi
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoInitializeEx
OleFlushClipboard
CoUninitialize
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoRegisterMessageFilter
CoCreateInstance
oleaut32
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
Sections
.text Size: 335KB - Virtual size: 335KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ