Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_9dc694a64c91608897563670657a7370_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_9dc694a64c91608897563670657a7370_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_9dc694a64c91608897563670657a7370_icedid_JC.exe
-
Size
5.0MB
-
MD5
9dc694a64c91608897563670657a7370
-
SHA1
ed65c4b41c2e4527da931c8c34894fa7c7acc543
-
SHA256
903d86f60f6f9e17b46158c8ad40038efcb637e945a4e27293b8d1723a919c07
-
SHA512
fbdca763d6c356a7a93e4e9deebdd783d2fccd1e5d3f8854d8d06bad01ad991e55a02cb66e7707a9b4af4bef175b7ff859c8600904c8c747cc43e23a9380986a
-
SSDEEP
12288:I+o+udTxslHQuuXd0RZ9558IwmJipTVZ1sCBiaKgxP7xfR+TrJD8IgSfR+T3:IwHXY+RL55BwmJu/sCBiQhR+TFwaR+T3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-26_9dc694a64c91608897563670657a7370_icedid_JC.exe
Files
-
2023-08-26_9dc694a64c91608897563670657a7370_icedid_JC.exe.exe windows:5 windows x86
dbb31ae9e88d785c2ac2b4ac6fd5bbb1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapFree
GetTimeZoneInformation
GetDriveTypeA
ExitThread
CreateThread
GetCommandLineA
GetStartupInfoA
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapSize
SetStdHandle
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetACP
HeapAlloc
VirtualFree
HeapCreate
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
ExitProcess
GetSystemTimeAsFileTime
RtlUnwind
GetTickCount
SetErrorMode
GetCurrentDirectoryA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetFileTime
GetFileSizeEx
GetFileAttributesA
CreateFileA
FindFirstFileA
FindClose
GetModuleHandleW
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetThreadLocale
GetCurrentProcessId
CreateEventA
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GetModuleFileNameW
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
LoadLibraryA
SetLastError
lstrcmpW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
GetLastError
OpenProcess
VirtualAllocEx
CloseHandle
ReadProcessMemory
VirtualFreeEx
lstrcpyA
MoveFileA
WritePrivateProfileStringA
MultiByteToWideChar
GetModuleFileNameA
lstrlenA
Sleep
SuspendThread
InterlockedDecrement
GetVersionExA
GetModuleHandleA
GetProcAddress
GetTempPathA
CreateDirectoryA
LoadResource
LockResource
SizeofResource
FindResourceA
IsValidCodePage
WideCharToMultiByte
user32
PostThreadMessageA
LoadMenuA
LoadAcceleratorsA
InsertMenuItemA
SetRectEmpty
TranslateAcceleratorA
InvalidateRgn
CopyAcceleratorTableA
CharUpperA
UnregisterClassA
GetSysColorBrush
DestroyMenu
ShowOwnedPopups
ReleaseCapture
SetCapture
IsRectEmpty
GetMessageA
TranslateMessage
ValidateRect
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CreateDialogIndirectParamA
IsWindowEnabled
GetNextDlgTabItem
EndDialog
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
MessageBeep
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
ScrollWindow
TrackPopupMenu
GetKeyState
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
IsWindowVisible
UpdateWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
SendMessageA
EnableWindow
BringWindowToTop
GetDesktopWindow
GetScrollInfo
SetScrollInfo
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
SetWindowRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
InflateRect
DrawIconEx
SetWindowContextHelpId
MapDialogRect
CharNextA
ReuseDDElParam
UnpackDDElParam
GetPropA
SetTimer
KillTimer
InvalidateRect
GetClientRect
RedrawWindow
SetWindowLongA
GetWindowLongA
PostMessageA
LoadImageA
IsWindow
FillRect
SetRect
GetParent
ReleaseDC
GetDC
LoadBitmapA
GetWindowRect
LoadCursorA
SetCursor
GetActiveWindow
WindowFromPoint
ClientToScreen
LoadIconA
GetClassNameA
EnumChildWindows
FindWindowA
GetSystemMetrics
CopyRect
MapWindowPoints
GetWindowThreadProcessId
GetSysColor
GetFocus
RegisterWindowMessageA
SendNotifyMessageA
DrawIcon
IsIconic
SetForegroundWindow
GetCursorPos
GetMenuItemInfoA
CheckMenuItem
CreatePopupMenu
InsertMenuA
PostQuitMessage
gdi32
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
ScaleWindowExtEx
LPtoDP
Ellipse
CreateRectRgnIndirect
GetMapMode
GetRgnBox
CreateCompatibleBitmap
GetBkColor
GetTextColor
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
CreateEllipticRgn
DeleteObject
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateRoundRectRgn
CreatePolygonRgn
CreateRectRgn
CombineRgn
FillRgn
FrameRgn
GetStockObject
CreatePen
GetPixel
CreateFontIndirectA
CreateSolidBrush
Rectangle
GetTextExtentPoint32A
CreateCompatibleDC
SelectObject
BitBlt
StretchBlt
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegDeleteKeyA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
Shell_NotifyIconA
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
_TrackMouseEvent
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
UrlUnescapeA
oledlg
ord8
ole32
CoRegisterMessageFilter
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
SysFreeString
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
VariantClear
SysAllocStringLen
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantCopy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
ws2_32
WSAGetLastError
socket
inet_addr
closesocket
ntohs
recvfrom
__WSAFDIsSet
select
sendto
htons
setsockopt
WSASetLastError
WSACleanup
WSAStartup
bind
gethostname
gethostbyname
inet_ntoa
wininet
InternetQueryOptionA
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetCanonicalizeUrlA
InternetCrackUrlA
Sections
.text Size: 411KB - Virtual size: 410KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ