Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_8c49a01a7dc0e88747de621e1bb3adda_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_8c49a01a7dc0e88747de621e1bb3adda_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_8c49a01a7dc0e88747de621e1bb3adda_icedid_JC.exe
-
Size
336KB
-
MD5
8c49a01a7dc0e88747de621e1bb3adda
-
SHA1
51846906be1ebd76791f103d0f4357b638acaba3
-
SHA256
05a574555e841414a1e0089e54dbcbb5040c0dd5d7ff3c5048c903506d5acb53
-
SHA512
0ae7cca1757f570f7ba31d715b4be95ef04160ba36286ed4060690bde3507484b83d596d5773e7315b8dbc3e62886b71862556df4b72aad6501d861c2a71e507
-
SSDEEP
6144:8V6iV4AxwmYELXfs/zuA7qWeczUUozF7lTGNamE0KRMfd3S4:3qYWXfs/zuEqZczST+amELRMf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-25_8c49a01a7dc0e88747de621e1bb3adda_icedid_JC.exe
Files
-
2023-08-25_8c49a01a7dc0e88747de621e1bb3adda_icedid_JC.exe.exe windows:4 windows x86
0947dcbaf45cf7862c9c344b02c3807f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rs232dll
ord21
ord34
ord22
ord31
ord33
ord2
ord19
ord18
ord20
c200_base
ord21
ord13
ord24
ord10
ord22
ord23
ord6
ord31
ord30
ord32
ws2_32
closesocket
accept
setsockopt
connect
send
socket
htons
listen
getsockname
bind
recv
WSAStartup
WSAGetLastError
inet_addr
htonl
inet_ntoa
gethostbyname
ioctlsocket
WSASocketA
ntohl
recvfrom
sendto
version
VerQueryValueA
GetFileVersionInfoA
kernel32
GetCurrentThreadId
GetCurrentThread
LocalFree
lstrcpynA
GlobalUnlock
MulDiv
GlobalFree
SetLastError
FreeResource
GlobalAddAtomA
WaitForSingleObject
FileTimeToSystemTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
CreateFileA
GetFileSize
GetFileTime
MoveFileA
DeleteFileA
ReadFile
WriteFile
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GlobalLock
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
SetErrorMode
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
FindNextFileA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
WritePrivateProfileStringA
InterlockedIncrement
InterlockedDecrement
GlobalFlags
LocalAlloc
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
RtlUnwind
SetEnvironmentVariableA
SetCurrentDirectoryA
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
TerminateProcess
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
LCMapStringA
LCMapStringW
GetTimeZoneInformation
SetHandleCount
GetStartupInfoA
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetUnhandledExceptionFilter
QueryPerformanceCounter
IsBadReadPtr
IsBadCodePtr
GetExitCodeProcess
CreateProcessA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
SetFilePointer
UnmapViewOfFile
CloseHandle
CreateFileMappingA
MapViewOfFile
SetVolumeLabelA
GetDiskFreeSpaceA
GetDriveTypeA
CreateDirectoryA
GetFileAttributesA
SetFileAttributesA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
SetConsoleCursorPosition
GetStdHandle
HeapAlloc
GetTickCount
GetCurrentProcessId
GetProcessHeap
HeapFree
GetCommandLineA
GetModuleHandleA
FormatMessageA
GetCurrentDirectoryA
LoadLibraryA
GetProcAddress
WideCharToMultiByte
GetUserDefaultLangID
lstrcpyA
lstrcatA
FindResourceA
LoadResource
LockResource
SizeofResource
Sleep
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
DuplicateHandle
user32
GetClassLongA
CreateWindowExA
GetCapture
WinHelpA
RegisterWindowMessageA
IsDialogMessageA
SetWindowTextA
ShowWindow
GetSysColorBrush
LoadCursorA
DestroyMenu
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetClassInfoExA
GetWindowPlacement
GetWindowRect
PtInRect
GetWindow
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
MessageBoxA
GetLastActivePopup
SetCursor
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
ReleaseDC
GetDC
wsprintfA
wvsprintfA
RedrawWindow
SetTimer
KillTimer
EnableWindow
SendMessageA
CopyRect
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetClassNameA
SetPropA
GetPropA
PostMessageA
RemovePropA
SendDlgItemMessageA
SetFocus
IsIconic
FillRect
DrawFocusRect
GetSysColor
CharUpperA
OemToCharBuffA
CharToOemBuffA
PostQuitMessage
gdi32
SetTextColor
SetMapMode
GetClipBox
SetTextAlign
DeleteObject
GetObjectA
DeleteDC
CreateBitmap
GetStockObject
ScaleWindowExtEx
CreateSolidBrush
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
CreateFontA
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ