Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_c32780bc6241ba6403552dce4d5bd68d_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_c32780bc6241ba6403552dce4d5bd68d_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_c32780bc6241ba6403552dce4d5bd68d_icedid_JC.exe
-
Size
208KB
-
MD5
c32780bc6241ba6403552dce4d5bd68d
-
SHA1
1eb41333833e1f1cad116467d9aa5e7c06b1cb62
-
SHA256
78ec72f6185276c5bbdf829fe929ca960fa9cf8505d8dfc7f6f5f3ef8bc4065f
-
SHA512
b6a28d2e289db3665ee61776482ed82d8ef315fb366812f4dec2240641622438692d47e136c40b63932a247919e3281af8e899d958830c2d6c0bc4f5d01a01e7
-
SSDEEP
3072:MNkyoxgtnSsEhFrCSyP1tH/HUqaLmoyCvIT7fOnDzBhg7AkYGtPkZUzoMCGezHD:CmgFMFBM0qto1E74B3U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_c32780bc6241ba6403552dce4d5bd68d_icedid_JC.exe
Files
-
2023-08-22_c32780bc6241ba6403552dce4d5bd68d_icedid_JC.exe.exe windows x86
8214892244c7ba9c04de4a7d59a1fb93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
RtlUnwind
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetErrorMode
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
InterlockedDecrement
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
RaiseException
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
SetLastError
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
CreateDirectoryA
GetFileSize
CreateFileA
GetFileAttributesA
GetVersion
lstrcmpiA
MultiByteToWideChar
DeleteCriticalSection
FindFirstChangeNotificationA
InitializeCriticalSection
GetLogicalDriveStringsA
CreateThread
GetLastError
CopyFileExA
GetDiskFreeSpaceExA
CloseHandle
WaitForSingleObject
FindCloseChangeNotification
FindClose
FindNextFileA
FindFirstFileA
Sleep
GetDriveTypeA
LocalFree
FormatMessageA
DeleteFileA
lstrcpyA
lstrlenA
LeaveCriticalSection
EnterCriticalSection
FindNextChangeNotification
WaitForMultipleObjects
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
FreeEnvironmentStringsW
InterlockedExchange
user32
LoadCursorA
GetSysColorBrush
DestroyMenu
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
PostQuitMessage
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
EndPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
InvalidateRect
GetSysColor
CopyRect
BeginPaint
InflateRect
DrawIconEx
DrawTextA
SendMessageA
EnableWindow
SetRect
IsWindow
GetParent
UpdateWindow
IsWindowVisible
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
SetWindowsHookExA
EqualRect
LoadIconA
wsprintfA
DestroyIcon
GetSystemMenu
AppendMenuA
GetClientRect
IsIconic
GetSystemMetrics
DrawIcon
GetWindowRect
GetWindow
PtInRect
GetWindowPlacement
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
gdi32
GetDeviceCaps
CreatePen
GetStockObject
CreateBitmap
DeleteDC
RectVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
GetTextColor
PtVisible
DeleteObject
MoveToEx
LineTo
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
CreateFontIndirectA
GetObjectA
GetCurrentObject
GetBkColor
TextOutA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
comctl32
ImageList_GetImageInfo
ImageList_GetIcon
ord17
ImageList_ReplaceIcon
ImageList_Destroy
ImageList_Create
shlwapi
PathFindFileNameA
PathFindExtensionA
PathFindNextComponentA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ