Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_18afb288a53ab2a1e40a4cee8b893797_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_18afb288a53ab2a1e40a4cee8b893797_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-27_18afb288a53ab2a1e40a4cee8b893797_icedid_JC.exe
-
Size
384KB
-
MD5
18afb288a53ab2a1e40a4cee8b893797
-
SHA1
b67cad1a42a24c4b0a4818d24c5d870dddcb9363
-
SHA256
77c637d6d2a9691f30f8bf3c29357632e0a6a029e9bd1845461e4224042b0908
-
SHA512
b7b9254208ffb59981774fec354b8b4434d7a77e4458abed25f9cc62684081c92d8b5b6b789bfaf0fc5af1573023ee325a10d2aa10fd845c24b3e98cd91cb454
-
SSDEEP
6144:3RndrXEmjgc+i81vKmowg7NteaCIfxaKTm4FHq5xkrToeva0CP0OPJYRmM:3RndTreKmowgvfQKTm4FHqyToFTzJC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-27_18afb288a53ab2a1e40a4cee8b893797_icedid_JC.exe
Files
-
2023-08-27_18afb288a53ab2a1e40a4cee8b893797_icedid_JC.exe.exe windows:5 windows x86
f261089e3424af661e1bf85fa99ce1d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
GetTickCount
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetStartupInfoA
ExitProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetFileSizeEx
VirtualFree
SetHandleCount
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
GetFileAttributesA
FileTimeToLocalFileTime
SetErrorMode
GetOEMCP
GetCPInfo
GetModuleHandleW
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
FileTimeToSystemTime
GetThreadLocale
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
FreeResource
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
lstrlenA
SetLastError
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
GetProcAddress
GetSystemTime
Sleep
GetProcessHeap
HeapAlloc
HeapFree
GetCurrentProcessId
TerminateProcess
GetWindowsDirectoryA
MultiByteToWideChar
CreatePipe
CreateProcessA
CloseHandle
ReadFile
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
HeapCreate
GetLastError
CreateFileW
user32
SetRect
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
GetWindowTextA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
OffsetRect
SetRectEmpty
ReleaseCapture
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetLastActivePopup
IsWindowEnabled
SetCursor
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
CloseClipboard
EmptyClipboard
SetWindowsHookExA
UnhookWindowsHookEx
GetAsyncKeyState
MessageBeep
CallNextHookEx
MessageBoxA
DrawIcon
AppendMenuA
LoadCursorA
WindowFromPoint
IsWindowVisible
GetWindowLongA
GetWindowThreadProcessId
GetSystemMetrics
LoadIconA
EnableWindow
OpenClipboard
KillTimer
SetTimer
GetClientRect
GetWindowRect
IsIconic
GetSystemMenu
SendMessageA
InvalidateRect
CharUpperA
GetSysColorBrush
GetDesktopWindow
SetCapture
CharNextA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetWindowTextLengthA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsZoomed
SetFocus
IsChild
gdi32
SetMapMode
ExcludeClipRect
IntersectClipRect
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
RestoreDC
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
ExtTextOutA
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
GetTextMetricsA
SelectObject
GetDeviceCaps
ScaleViewportExtEx
CreateSolidBrush
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyA
RegDeleteValueA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegCreateKeyExA
shell32
ShellExecuteA
ShellExecuteExA
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoCreateInstance
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocStringLen
VariantClear
VariantInit
SysStringLen
SysAllocStringByteLen
VariantChangeType
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
wininet
InternetCheckConnectionA
FindCloseUrlCache
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
iphlpapi
GetTcpTable2
ws2_32
ntohs
inet_ntoa
Sections
.text Size: 273KB - Virtual size: 273KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ