Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_a194e15ff0e4f9bc8f80cc133429193f_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_a194e15ff0e4f9bc8f80cc133429193f_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_a194e15ff0e4f9bc8f80cc133429193f_icedid_JC.exe
-
Size
600KB
-
MD5
a194e15ff0e4f9bc8f80cc133429193f
-
SHA1
10a855111ba568dc49a056565be8e3ecfce7463b
-
SHA256
bf70e7219fe1dc25d80d97ea774cf7411240221f5790b136361a847b3313d132
-
SHA512
a8c54f1acad7227feb9936204fb1308900100b671738aabe5980a10f91c68bb925150ee22ad0a8d1a43f856a2ed7de52247c1a0597cad465042784df2ebb452d
-
SSDEEP
12288:6jnNEg57BkO8j9tfn31TIClvNkpb1zFLKEEY3JQIkzxgTgXhsj:6jn98tfnZICpNkpb1zFuErC5zxwgsj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-25_a194e15ff0e4f9bc8f80cc133429193f_icedid_JC.exe
Files
-
2023-08-25_a194e15ff0e4f9bc8f80cc133429193f_icedid_JC.exe.exe windows:4 windows x86
72ff6b425c048d42784ff9743932738b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
VirtualQuery
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitThread
CreateThread
ExitProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetFileType
Sleep
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoW
SetEnvironmentVariableA
HeapAlloc
HeapFree
SetErrorMode
LocalFileTimeToFileTime
FileTimeToLocalFileTime
CreateFileA
GetShortPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
DeleteFileA
MoveFileA
GetCurrentDirectoryA
SystemTimeToFileTime
FileTimeToSystemTime
GetThreadLocale
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
InterlockedDecrement
GetModuleFileNameW
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetCurrentProcessId
MulDiv
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
SetLastError
lstrcmpW
GetModuleHandleA
GetProcAddress
GetVersionExA
GlobalFree
FreeResource
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalCompact
DeleteCriticalSection
GetCurrentProcess
WriteFile
CreatePipe
EnterCriticalSection
LeaveCriticalSection
LocalFree
CreateProcessA
FormatMessageA
CloseHandle
InitializeCriticalSection
DuplicateHandle
ReadFile
GetTickCount
GetModuleFileNameA
WaitForSingleObject
CompareStringA
MultiByteToWideChar
GetStringTypeExA
lstrlenA
lstrcmpiA
CompareStringW
CreateFileW
LoadResource
WideCharToMultiByte
InterlockedExchange
LockResource
FindResourceA
GetLastError
GetVersion
SizeofResource
SetHandleCount
user32
DestroyIcon
UnregisterClassA
KillTimer
GetDCEx
LockWindowUpdate
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetForegroundWindow
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
DestroyMenu
GetClassInfoExA
GetClassInfoA
DeleteMenu
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
IsWindowVisible
GetUpdateRgn
PostMessageA
OpenClipboard
MessageBeep
SetTimer
SetClipboardData
EmptyClipboard
GetWindowRect
CloseClipboard
DrawTextA
MessageBoxA
ReleaseCapture
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
wsprintfA
GetSysColor
GetClientRect
SetRect
CopyRect
FrameRect
FillRect
ReleaseDC
SendMessageA
InvalidateRect
GetDC
EnableWindow
CharUpperA
GetMenuItemInfoA
GetSysColorBrush
SetParent
IsZoomed
LoadCursorA
WindowFromPoint
SetCapture
UnpackDDElParam
ReuseDDElParam
RegisterClassA
LoadMenuA
SetMenu
TranslateAcceleratorA
ShowOwnedPopups
SetCursor
PostQuitMessage
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
InflateRect
GetWindowThreadProcessId
GetMenuStringA
InsertMenuA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
CreateWindowExA
ShowWindow
IsChild
gdi32
GetClipBox
CreateBitmap
CreateDCA
ExtTextOutA
CreateRectRgn
SetRectRgn
CombineRgn
PatBlt
DeleteObject
CreatePatternBrush
DPtoLP
SaveDC
RestoreDC
SetBkMode
SetMapMode
ExcludeClipRect
IntersectClipRect
LineTo
MoveToEx
SelectClipRgn
BitBlt
SetTextColor
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
PolyBezierTo
DeleteDC
CreateCompatibleDC
SelectPalette
CreatePen
CreateCompatibleBitmap
GetCharWidthA
CreateFontA
StretchDIBits
GetTextExtentPoint32A
GetBkColor
GetPath
EndPath
BeginPath
RealizePalette
SetBkColor
GetDeviceCaps
CreateFontIndirectA
GetTextMetricsA
CreateRectRgnIndirect
GetObjectA
FillRgn
GetStockObject
CreateSolidBrush
GetPixel
SelectObject
Rectangle
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegSetValueA
RegCloseKey
RegCreateKeyA
shell32
SHGetFileInfoA
DragFinish
DragAcceptFiles
DragQueryFileA
ExtractIconA
ShellExecuteA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oleaut32
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 400KB - Virtual size: 397KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 144KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ