Static task
static1
Behavioral task
behavioral1
Sample
2023-08-23_600eae02856e12eb4f759d603b0c7e88_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-23_600eae02856e12eb4f759d603b0c7e88_icedid_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-23_600eae02856e12eb4f759d603b0c7e88_icedid_JC.exe
-
Size
1.1MB
-
MD5
600eae02856e12eb4f759d603b0c7e88
-
SHA1
80edf32c786fcb106eb6c415872c665d4f1ee7cc
-
SHA256
ff4fdb3b78efb08d81084032dbf950ccfcce86837bdbee6e1602a6a0935a2abd
-
SHA512
c8307a37c54f3ad04e090d18d25608da86856d9cc512c358ca34ab840911f2140c8af0fb3a92b8d36cd42cc70329cb3655ac342b8ec8cfbb25ac6bb425211058
-
SSDEEP
12288:XV5jQoUWq37vj9Gv9UmFA7bePdSfXFWZaCxPkyuHP:X+Wq3dGvumFwCFSvUaCxPkyuHP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-23_600eae02856e12eb4f759d603b0c7e88_icedid_JC.exe
Files
-
2023-08-23_600eae02856e12eb4f759d603b0c7e88_icedid_JC.exe.exe windows x86
0bb3611f81554192695c6f871231a8a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
GetFileSizeEx
GetFileTime
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
TlsGetValue
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetModuleHandleW
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
RtlUnwind
SetStdHandle
GetFileType
ExitProcess
GetSystemTimeAsFileTime
HeapFree
GetTimeFormatA
GetDateFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitThread
GetCommandLineA
GlobalReAlloc
HeapAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
HeapReAlloc
HeapSize
GetACP
IsValidCodePage
SetHandleCount
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetFullPathNameA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
FormatMessageA
LocalFree
GetCurrentProcessId
SetLastError
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
FreeResource
GlobalFree
MulDiv
CreateEventA
ResumeThread
SetEvent
WaitForSingleObject
ResetEvent
GetDriveTypeA
LCMapStringA
GetLogicalDriveStringsA
VirtualAllocEx
WriteProcessMemory
FindNextFileA
GlobalAlloc
GlobalLock
GlobalUnlock
RemoveDirectoryA
GetFileAttributesA
GetCurrentThreadId
GetComputerNameA
GetSystemDefaultLangID
CreateThread
lstrcpyA
GetSystemInfo
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
SetFileAttributesA
Sleep
DeleteFileA
GetVolumeInformationA
GetVersionExA
CreateDirectoryA
FindFirstFileA
FindClose
InterlockedDecrement
WriteFile
lstrlenW
MultiByteToWideChar
GetModuleFileNameW
OpenProcess
SetConsoleTextAttribute
InterlockedIncrement
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrlenA
CreateFileA
DeviceIoControl
CloseHandle
CreateMutexA
GetLastError
GetStdHandle
GetModuleFileNameA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
GetStartupInfoA
SizeofResource
user32
SetCapture
CharUpperA
DestroyMenu
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowContextHelpId
MapDialogRect
ShowWindow
IsDialogMessageA
SetDlgItemTextA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
RemovePropA
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
FindWindowA
SetWindowPos
LoadBitmapA
DrawIcon
RegisterClassA
AdjustWindowRectEx
EqualRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
LoadCursorA
ReleaseCapture
CharNextA
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
RegisterClipboardFormatA
SetPropA
CreatePopupMenu
AppendMenuA
PostThreadMessageA
GetPropA
SendMessageA
PostMessageA
GetSystemMenu
IsIconic
BringWindowToTop
GetClientRect
SetTimer
GetLastActivePopup
SetForegroundWindow
EnableWindow
LoadIconA
SystemParametersInfoA
GetSystemMetrics
GetCursorPos
GetWindowTextA
EnumWindows
MessageBoxA
MoveWindow
SetWindowTextA
keybd_event
SwitchToThisWindow
GetWindowThreadProcessId
GetForegroundWindow
GetSysColorBrush
VkKeyScanA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetWindowTextLengthA
IsWindowVisible
SetWindowLongA
OffsetRect
IntersectRect
GetWindowPlacement
GetWindow
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowLongA
IsWindowEnabled
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
PeekMessageA
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostQuitMessage
SetRect
CopyRect
GetDC
ReleaseDC
GetSysColor
FillRect
IsWindow
SetCursorPos
mouse_event
SetFocus
InvalidateRect
GetWindowRect
gdi32
GetMapMode
GetRgnBox
GetTextColor
BitBlt
CreateRectRgnIndirect
GetStockObject
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
CreateSolidBrush
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
GetBkColor
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetFolderPathA
SHGetSpecialFolderPathA
SHFileOperationA
shlwapi
PathFileExistsA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
UrlUnescapeA
PathFindFileNameA
oledlg
ord8
ole32
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
CoRevokeClassObject
OleIsCurrentClipboard
CoTaskMemFree
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
CoCreateInstance
OleFlushClipboard
CoRegisterMessageFilter
OleInitialize
oleaut32
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
SysStringLen
SysAllocStringLen
OleLoadPicture
VariantClear
VariantChangeType
VariantCopy
VariantInit
SysFreeString
SysAllocStringByteLen
SysAllocString
ws2_32
gethostbyname
gethostname
WSASetLastError
inet_ntoa
WSAStartup
socket
htonl
htons
bind
listen
accept
WSACleanup
recv
send
closesocket
wininet
InternetGetCookieA
FtpCreateDirectoryA
InternetSetCookieA
HttpQueryInfoA
InternetOpenUrlA
InternetReadFile
FtpPutFileA
InternetOpenA
InternetConnectA
FtpSetCurrentDirectoryA
FtpGetFileA
InternetCloseHandle
InternetGetConnectedState
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
FtpGetCurrentDirectoryA
InternetFindNextFileA
InternetGetLastResponseInfoA
InternetSetStatusCallback
InternetSetFilePointer
FtpFindFirstFileA
InternetCrackUrlA
InternetWriteFile
psapi
EnumProcesses
GetModuleBaseNameA
EnumProcessModules
Sections
.text Size: 481KB - Virtual size: 481KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 557KB - Virtual size: 556KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ