Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_421f3831c8c3638f81d937bd8fe268d0_icedid_JC.exe
Resource
win7-20230831-en
General
-
Target
2023-08-25_421f3831c8c3638f81d937bd8fe268d0_icedid_JC.exe
-
Size
386KB
-
MD5
421f3831c8c3638f81d937bd8fe268d0
-
SHA1
6a0a8946b8749ded4831451b06aaf47d6da40120
-
SHA256
42c8e0f82918eb063c5a14b97c32a6ff72403bb206dc5015313260366d2a5888
-
SHA512
7df5930c5b6dd0d1c03b22f96ef027d76f70edd386961b5feec9d42bb71d9ca47fdf1d5940628714f712ec840e836ef73515b41f62d26d023bd4cba23cfe114f
-
SSDEEP
6144:jFBmp2Gib7zMvJfgM+6WfLzNgPvZEQC0jybDmPUUImPczu8DRyV:jOfgT6Wf1gPvR3juwUNmkzu8FyV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-25_421f3831c8c3638f81d937bd8fe268d0_icedid_JC.exe
Files
-
2023-08-25_421f3831c8c3638f81d937bd8fe268d0_icedid_JC.exe.exe windows:5 windows x86
8886f25cba86002657c47aee8a1b1784
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
CompareStringW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
GetCurrentThreadId
GlobalFlags
GlobalHandle
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
HeapAlloc
HeapFree
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
Sleep
ExitProcess
GetTimeZoneInformation
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
lstrlenA
GetCurrentProcessId
GetFileTime
GetFileSizeEx
FileTimeToLocalFileTime
FileTimeToSystemTime
FreeLibrary
InterlockedDecrement
GetModuleHandleW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetProcAddress
GetModuleFileNameW
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryW
SetLastError
WideCharToMultiByte
LocalAlloc
FindClose
lstrlenW
lstrcmpW
GetFileAttributesW
FindFirstFileW
lstrcmpA
CloseHandle
CreateFileW
CopyFileW
GetPrivateProfileStringW
MultiByteToWideChar
OpenProcess
WaitForSingleObject
SetFileAttributesW
LocalFree
DeleteFileW
LockResource
MoveFileW
GetLastError
GetTempPathW
FormatMessageW
SizeofResource
LoadResource
CompareStringA
FindResourceW
user32
SetWindowTextW
ValidateRect
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
IsWindow
DispatchMessageW
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
GetClientRect
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
PtInRect
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
ClientToScreen
GrayStringW
DrawTextExW
MessageBoxW
GetForegroundWindow
DrawTextW
TabbedTextOutW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
PostQuitMessage
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetDlgItem
GetSystemMetrics
CharUpperW
GetSubMenu
GetMenuItemCount
GetWindowTextW
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
SetForegroundWindow
advapi32
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteW
SHGetFolderPathW
shlwapi
PathIsUNCW
PathFindFileNameW
PathStripToRootW
crypt32
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CryptDecodeObject
CryptMsgClose
CryptMsgGetParam
wintrust
WinVerifyTrust
oleacc
LresultFromObject
CreateStdAccessibleObject
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
GetModuleFileNameExW
gdi32
RestoreDC
SetBkColor
SetTextColor
SaveDC
SetMapMode
GetClipBox
OffsetViewportOrgEx
CreateBitmap
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
GetDeviceCaps
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
SetViewportExtEx
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
comdlg32
GetFileTitleW
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 186KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE