Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_7c1695f89d45b25785d3577cfe89c63a_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_7c1695f89d45b25785d3577cfe89c63a_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_7c1695f89d45b25785d3577cfe89c63a_icedid_JC.exe
-
Size
208KB
-
MD5
7c1695f89d45b25785d3577cfe89c63a
-
SHA1
ffc04cd1ce0eebefff0b69607e3a24bf5c817965
-
SHA256
0d6fbc07000debf245d916560b3559249028ae485a6d5ab463c3299d6e816995
-
SHA512
1910d038502c6457fdec0623fb0a9d634197b64c5a525e8a2fafe875d8fad4830dbbf3f72f844c14dca6e8b981502d8497d7d9c79597ea86455e15e9652cbade
-
SSDEEP
3072:0NkyoxgtnSsEhFrCSyP1tH/HUqaLmoyCvIT7fOnDzBhg7AkYGtPkZUzoMCGezHD:qmgFMFBM0qto1E74B3U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_7c1695f89d45b25785d3577cfe89c63a_icedid_JC.exe
Files
-
2023-08-22_7c1695f89d45b25785d3577cfe89c63a_icedid_JC.exe.exe windows x86
8214892244c7ba9c04de4a7d59a1fb93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
RtlUnwind
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetErrorMode
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
InterlockedDecrement
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
RaiseException
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
SetLastError
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
CreateDirectoryA
GetFileSize
CreateFileA
GetFileAttributesA
GetVersion
lstrcmpiA
MultiByteToWideChar
DeleteCriticalSection
FindFirstChangeNotificationA
InitializeCriticalSection
GetLogicalDriveStringsA
CreateThread
GetLastError
CopyFileExA
GetDiskFreeSpaceExA
CloseHandle
WaitForSingleObject
FindCloseChangeNotification
FindClose
FindNextFileA
FindFirstFileA
Sleep
GetDriveTypeA
LocalFree
FormatMessageA
DeleteFileA
lstrcpyA
lstrlenA
LeaveCriticalSection
EnterCriticalSection
FindNextChangeNotification
WaitForMultipleObjects
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
FreeEnvironmentStringsW
InterlockedExchange
user32
LoadCursorA
GetSysColorBrush
DestroyMenu
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
PostQuitMessage
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
EndPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
InvalidateRect
GetSysColor
CopyRect
BeginPaint
InflateRect
DrawIconEx
DrawTextA
SendMessageA
EnableWindow
SetRect
IsWindow
GetParent
UpdateWindow
IsWindowVisible
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
SetWindowsHookExA
EqualRect
LoadIconA
wsprintfA
DestroyIcon
GetSystemMenu
AppendMenuA
GetClientRect
IsIconic
GetSystemMetrics
DrawIcon
GetWindowRect
GetWindow
PtInRect
GetWindowPlacement
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
gdi32
GetDeviceCaps
CreatePen
GetStockObject
CreateBitmap
DeleteDC
RectVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
GetTextColor
PtVisible
DeleteObject
MoveToEx
LineTo
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
CreateFontIndirectA
GetObjectA
GetCurrentObject
GetBkColor
TextOutA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
comctl32
ImageList_GetImageInfo
ImageList_GetIcon
ord17
ImageList_ReplaceIcon
ImageList_Destroy
ImageList_Create
shlwapi
PathFindFileNameA
PathFindExtensionA
PathFindNextComponentA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ