Behavioral task
behavioral1
Sample
2023-08-27_30364fad4b969517fcc2fa70deb55bfe_icedid_JC.exe
Resource
win7-20230831-en
General
-
Target
2023-08-27_30364fad4b969517fcc2fa70deb55bfe_icedid_JC.exe
-
Size
7.1MB
-
MD5
30364fad4b969517fcc2fa70deb55bfe
-
SHA1
7213826b6df2b1790b84165081232d1ef41f93d6
-
SHA256
6defad8f89827cbefe6b597dfa14bd7dbcfea2ccd1163e7c88353b1822d5adb5
-
SHA512
4436034d9765ab9c10ffce231be7bf74ac3238d4f950b7accc58b4b8b1008fafc2c78b4b3f702101e7c9dbdc0ff7f0fc129da476d1263c7c3e68805715581559
-
SSDEEP
98304:9aO43iPDC+kAEVcvDXGsUgG1/Q/g+Ze4Op6cuBe3QuLeqFOLHVby:Q1SrnkJyDZHFg+ZFOgcuBEQ+eqFc9y
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-27_30364fad4b969517fcc2fa70deb55bfe_icedid_JC.exe
Files
-
2023-08-27_30364fad4b969517fcc2fa70deb55bfe_icedid_JC.exe.exe windows:4 windows x86
b9f508bfad6339116bf3f403d5ffe878
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
LocalAlloc
LocalFree
CloseHandle
GetModuleHandleA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LCMapStringA
GetCommandLineA
SetCurrentDirectoryA
MoveFileA
SetFileAttributesA
GetStartupInfoA
FormatMessageA
GetUserDefaultLCID
GetLocalTime
FindFirstFileA
FindNextFileA
GetTickCount
GetFileSize
ReadFile
CreateDirectoryA
WritePrivateProfileStringA
GetModuleFileNameA
GetPrivateProfileStringA
IsBadReadPtr
HeapReAlloc
ExitProcess
lstrcmpiW
lstrcmpW
HeapCreate
HeapDestroy
InterlockedDecrement
InterlockedIncrement
InterlockedExchangeAdd
RtlZeroMemory
HeapAlloc
HeapFree
GetProcessHeap
lstrcpyA
VirtualFree
LoadLibraryA
FindNextFileW
DeleteFileW
DeleteFileA
VirtualFreeEx
CreateRemoteThread
VirtualQueryEx
lstrcpyn
SetWaitableTimer
CreateWaitableTimerA
GetComputerNameA
GetVolumeInformationA
DeviceIoControl
lstrcpynA
QueryDosDeviceW
Process32First
lstrlenW
FindClose
FindFirstFileW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
WideCharToMultiByte
TerminateThread
CreateThread
WriteFile
CreateDirectoryW
GetFileAttributesW
GetProcAddress
GetModuleHandleW
SetEndOfFile
SetFilePointer
LoadLibraryW
FreeLibrary
lstrlenA
MultiByteToWideChar
IsBadCodePtr
CreateToolhelp32Snapshot
Process32Next
LocalSize
RtlMoveMemory
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
SetThreadContext
ResumeThread
WaitForSingleObject
GetEnvironmentVariableA
TerminateProcess
AddVectoredExceptionHandler
VirtualAlloc
GetCurrentProcessId
CreateFileA
GetLastError
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetCurrentProcess
Sleep
SetLastError
lstrcatA
LockResource
LoadResource
FindResourceA
GetTimeZoneInformation
GetVersion
DeleteCriticalSection
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
MulDiv
FlushFileBuffers
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
GetSystemTime
RaiseException
GetACP
HeapSize
SetStdHandle
GetFileType
UnhandledExceptionFilter
user32
TabbedTextOutA
DrawTextA
GrayStringA
UnhookWindowsHookEx
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetDlgCtrlID
GetMenuItemCount
SendDlgItemMessageA
IsDialogMessageA
SetFocus
GetWindowPlacement
IsIconic
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetClassLongA
CreateWindowExA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
UnregisterClassA
DestroyMenu
SetWindowTextA
GetWindow
PtInRect
IsWindowVisible
GetWindowLongA
GetWindowTextA
GetCursorPos
GetDlgItem
ShowWindow
UpdateWindow
SystemParametersInfoA
GetDC
GetClassNameA
GetWindowRect
ClientToScreen
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
MsgWaitForMultipleObjects
SetWindowPos
SetForegroundWindow
FindWindowExA
PostMessageW
SendMessageA
GetWindowThreadProcessId
GetWindowTextLengthW
GetWindowTextW
LoadCursorA
SetCursor
RegisterWindowMessageA
FindWindowA
CallWindowProcA
IsWindow
SetWindowLongA
CreateIconFromResource
SetPropA
GetPropA
GetClientRect
MessageBoxA
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
CloseClipboard
SetClipboardData
CheckMenuItem
EnableMenuItem
GetFocus
GetSystemMetrics
SetActiveWindow
EmptyClipboard
OpenClipboard
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
PostMessageA
PostThreadMessageA
PostQuitMessage
EnableWindow
GetParent
IsWindowEnabled
GetForegroundWindow
GetActiveWindow
ReleaseDC
advapi32
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
CryptAcquireContextA
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
RegCloseKey
RegQueryValueExA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderPathA
Shell_NotifyIconA
ShellExecuteA
SHGetMalloc
ole32
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
OleInitialize
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
OleRun
CoCreateInstance
CLSIDFromString
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromProgID
shlwapi
PathIsDirectoryW
PathIsDirectoryEmptyA
PathIsURLA
StrToIntExW
StrToIntW
PathFileExistsA
gdi32
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetStockObject
GetObjectA
GetDeviceCaps
SelectObject
DeleteDC
DeleteObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetSetOptionA
InternetOpenUrlA
InternetGetConnectedState
InternetSetCookieA
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
winhttp
WinHttpOpenRequest
WinHttpSetCredentials
WinHttpCloseHandle
WinHttpSetOption
WinHttpAddRequestHeaders
WinHttpConnect
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpQueryHeaders
WinHttpSetTimeouts
WinHttpOpen
WinHttpCrackUrl
WinHttpSendRequest
WinHttpCheckPlatform
gdiplus
GdipGetImageHeight
GdiplusShutdown
GdipDisposeImage
GdipGetImageWidth
GdipLoadImageFromStream
GdipLoadImageFromFile
GdiplusStartup
psapi
GetProcessImageFileNameW
oledlg
ord8
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroyDescriptor
VariantInit
SafeArrayAllocDescriptor
SafeArrayAllocData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
SafeArrayDestroy
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
iphlpapi
GetAdaptersInfo
ws2_32
WSACleanup
WSAStartup
closesocket
select
recv
send
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comctl32
ord17
rasapi32
RasHangUpA
RasGetConnectStatusA
Sections
.text Size: 928KB - Virtual size: 926KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6.2MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE