Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_fb3a14c7169b4aef5af01f5e1ecda387_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_fb3a14c7169b4aef5af01f5e1ecda387_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_fb3a14c7169b4aef5af01f5e1ecda387_icedid_JC.exe
-
Size
12.7MB
-
MD5
fb3a14c7169b4aef5af01f5e1ecda387
-
SHA1
79e8d42dc5a2bbb2928c2a5773b36087b339b5cb
-
SHA256
b407ee6b12ce93d7b1461561e6b7c314c11df62152a8ae9e87ec6170f17f7636
-
SHA512
275ae6a72652713d57d2d6d3d0a71b8ecb57dd49bf011f7dc9424bb6701a164182959f4e899eb6b9945581cade695805395d5de15be12d115122207ad1fc5b8c
-
SSDEEP
24576:6e/1VwXQHjk//zsHcNMYaI2tVqEBle+eGWolQ0+VGaWH2lE:6+WXQDAMFYC8sTlkVj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_fb3a14c7169b4aef5af01f5e1ecda387_icedid_JC.exe
Files
-
2023-08-22_fb3a14c7169b4aef5af01f5e1ecda387_icedid_JC.exe.exe windows x86
3bd0ebf8215e381ce4001254273e5598
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dinput8
DirectInput8Create
kernel32
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapReAlloc
RaiseException
ExitProcess
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
VirtualAlloc
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
LockResource
SizeofResource
FindResourceExW
GetUserDefaultLangID
FindResourceW
LoadResource
FindClose
FindNextFileA
FindFirstFileA
GetModuleHandleW
WaitForSingleObject
CreateProcessW
CloseHandle
GetVersionExW
LocalFree
CreateMutexW
GetCommandLineW
GetLastError
CreateDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
SetEvent
SetLastError
CreateEventW
CreateThread
ConnectNamedPipe
ReadFile
WriteFile
GetOverlappedResult
CancelIo
WaitForMultipleObjects
LocalAlloc
FlushFileBuffers
SetFilePointer
WritePrivateProfileStringW
GlobalFlags
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetThreadLocale
GetCurrentProcess
CompareFileTime
GetProcessTimes
OpenProcess
Process32NextW
Process32FirstW
GetCurrentProcessId
CreateToolhelp32Snapshot
SetNamedPipeHandleState
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
InterlockedExchange
GetModuleHandleA
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
MulDiv
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
CreateNamedPipeW
CreateFileW
LCMapStringW
user32
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
ReleaseDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
UnregisterClassW
MapWindowPoints
GetKeyState
IsWindowVisible
UpdateWindow
GetMenu
PostMessageW
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
CopyRect
PtInRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnhookWindowsHookEx
GetWindowTextW
GetParent
SetWindowPos
GetSysColorBrush
LoadCursorW
DestroyMenu
SetFocus
IsWindowEnabled
PeekMessageW
ShowWindow
SetWindowLongW
GetDlgCtrlID
IsWindow
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
GetDlgItem
GetWindow
InvalidateRect
GetDC
DrawIcon
LoadIconW
IsIconic
SetForegroundWindow
FindWindowW
GetWindowLongW
EnableWindow
SetTimer
GetFocus
GetClientRect
SendMessageW
LoadBitmapW
GetSystemMetrics
AdjustWindowRectEx
UnregisterClassA
gdi32
DeleteObject
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetStockObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
StretchBlt
CreateCompatibleDC
GetObjectW
GetDeviceCaps
msimg32
TransparentBlt
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
CryptGenRandom
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
CryptAcquireContextW
RegQueryValueExW
CryptReleaseContext
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
shell32
CommandLineToArgvW
SHGetFolderPathA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathFindExtensionW
ole32
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.secudmp Size: 11.1MB - Virtual size: 11.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.new Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE