Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_cb2b6c391082c7fee869978eda4ad6e7_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_cb2b6c391082c7fee869978eda4ad6e7_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_cb2b6c391082c7fee869978eda4ad6e7_icedid_JC.exe
-
Size
796KB
-
MD5
cb2b6c391082c7fee869978eda4ad6e7
-
SHA1
0f6394229df225508a7aacde910ecfb55278c9a4
-
SHA256
392e5ba6c45764c6d530b939dd1aee1905fd9650ad2c003cc0201ee31f2019f9
-
SHA512
59aee9dba4921fb0c2301ad30d4a388ec79c7ef55ea8e339a4ccf0d8cbe34bca8fcc7653eda5b720e685919ead5a40ebd4b00567f9a0ff7da1be0a01d841041f
-
SSDEEP
6144:gsfVmwdcWDYB6yU1s49LeRW2jt5xNiqEoPLAOZWWGNGqouGwU6Hff9NfSdhrvy0N:F7Hyqj9eW2jt5Gqz78fVNfSX+ngw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_cb2b6c391082c7fee869978eda4ad6e7_icedid_JC.exe
Files
-
2023-08-22_cb2b6c391082c7fee869978eda4ad6e7_icedid_JC.exe.exe windows x86
af4cc6c2226ccf0939616605ff2c5c94
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipFree
GdipSetSolidFillColor
GdipCreatePen1
GdipDeletePen
GdipCreateStringFormat
GdipDeleteStringFormat
GdipDeleteGraphics
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipDeleteFont
GdipCreateSolidFill
GdipSetPenMode
GdipSetPenColor
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipCreateFromHDC
GdipSetTextRenderingHint
GdipSetSmoothingMode
GdipDrawLineI
GdipDrawString
GdipCreateFont
GdipAlloc
GdipCloneBrush
GdipDrawArcI
GdipFillRectangle
GdipFillRectangleI
GdipFillEllipseI
GdipSetPenStartCap
GdipSetPenEndCap
GdipDrawLine
GdipDrawArc
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipDrawImageI
GdipCloneImage
GdiplusStartup
GdipFillPolygonI
GdiplusShutdown
GdipDeleteBrush
mafwpnl
fwpGetDriverAndFirmwareVersion
fwpSetSpdifBypass
fwpSetSampleRate
fwpSetSyncSource
fwpSetBufferSize
fwpSetVirtualRotaryDelta
?fwpSetAsioDmDisable@@YA?AW4FWP_ERR@@HH@Z
?fwpSetMomentarySwitchTarget@@YA?AW4FWP_ERR@@HK@Z
fwpSetHeadphoneSource
?fwpSetHeadphone2Source@@YA?AW4FWP_ERR@@HH@Z
fwpSetHeadphoneLevel
fwpSetAuxPan
fwpSetAuxOutputLevel
fwpSetOutputLevel
fwpSetSWReturnRouting
fwpSetSWReturnLevel
fwpSetInputDestination
fwpSetInputLevel
?fwpSetAdatInSelect@@YA?AW4FWP_ERR@@HH@Z
?fwpSetAdatOutSelect@@YA?AW4FWP_ERR@@HH@Z
?fwpSetRcaSelect@@YA?AW4FWP_ERR@@HH@Z
?fwpSetADATSMux96@@YA?AW4FWP_ERR@@HH@Z
fwpGetMeterLevels
fwpGetNumDevices
?fwpGetDeviceInfo@@YA?AW4FWP_ERR@@HPAUHWDETAILSTRUCT@@@Z
fwpOpenDevices
fwpCloseDevices
fwpGetDeviceData
fwpSetOutMute
fwpSetOutDim
fwpSetAuxSendLevel
fwpSetLink
fwpSetRotaryTarget
fwpSetSolo
fwpSetMute
fwpSetAuxMonitor
fwpSetInputPan
kernel32
SetLastError
InterlockedDecrement
VirtualProtect
lstrcpyA
EnumResourceLanguagesA
ConvertDefaultLocale
GetModuleFileNameA
lstrcmpA
GetCurrentThread
CloseHandle
GetPrivateProfileIntA
WritePrivateProfileStringA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
CreateFileA
RaiseException
InitializeCriticalSection
GlobalFlags
LocalAlloc
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
RtlUnwind
HeapAlloc
HeapFree
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
MulDiv
FormatMessageA
LocalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
InterlockedExchange
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
MultiByteToWideChar
CreateMutexA
GetLastError
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
DeleteCriticalSection
user32
GetDlgItem
DispatchMessageA
SetActiveWindow
GetLastActivePopup
GetForegroundWindow
GetWindowTextA
GetWindowTextLengthA
SetFocus
IsWindow
GetFocus
SendDlgItemMessageA
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassInfoExA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetCapture
WinHelpA
RegisterWindowMessageA
IsDialogMessageA
SetWindowTextA
MoveWindow
ShowWindow
IsWindowEnabled
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
BeginPaint
EndPaint
GetCursorPos
EndDialog
CreateDialogIndirectParamA
GetDesktopWindow
wsprintfA
PostQuitMessage
ValidateRect
TranslateMessage
GetMessageA
GetSysColorBrush
LoadCursorA
GetTopWindow
IsWindowVisible
UpdateWindow
GetMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
ScreenToClient
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
PtInRect
GetWindow
CharUpperA
EnableScrollBar
ShowScrollBar
SetScrollRange
SetScrollPos
LoadIconA
KillTimer
SetTimer
RegisterDeviceNotificationA
ReleaseCapture
SetCapture
RedrawWindow
MapWindowPoints
LoadBitmapA
DestroyMenu
LoadMenuA
DestroyCursor
LoadImageA
FillRect
GetSubMenu
TrackPopupMenuEx
PostMessageA
SetCursor
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowLongA
WindowFromPoint
GetParent
GetNextDlgTabItem
GetActiveWindow
GetWindowRect
DrawFocusRect
FrameRect
OffsetRect
GetIconInfo
GetDC
CreateIconIndirect
ReleaseDC
DrawStateA
DestroyIcon
EnableWindow
InvalidateRect
GetClientRect
SendMessageA
CopyRect
InflateRect
GetSysColor
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
ScrollWindow
MessageBoxA
GetKeyState
SetForegroundWindow
ClientToScreen
gdi32
SetBkMode
SetMapMode
ExcludeClipRect
CreateCompatibleBitmap
GetObjectA
RestoreDC
SaveDC
GetClipBox
GetDeviceCaps
StretchBlt
Escape
TextOutA
RectVisible
PtVisible
LPtoDP
DPtoLP
GetPixel
SetPixel
CreateBitmap
CreateCompatibleDC
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
GetStockObject
DeleteObject
GetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
CreateSolidBrush
ExtTextOutA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
shell32
SHChangeNotify
DragFinish
DragQueryFileA
ShellExecuteExA
comctl32
_TrackMouseEvent
ImageList_Destroy
ord17
shlwapi
PathRemoveExtensionA
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CreateStreamOnHGlobal
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 304KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 404KB - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ