Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_4ec6710308c646729b9c0bd1c565899a_icedid_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_4ec6710308c646729b9c0bd1c565899a_icedid_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-07_4ec6710308c646729b9c0bd1c565899a_icedid_JC.exe
-
Size
1.1MB
-
MD5
4ec6710308c646729b9c0bd1c565899a
-
SHA1
fe9ebbc789dd8fd8a85b853d057fb41f9ed606e0
-
SHA256
368c85d3dbf68898253bc022da83c2525cc9f0ee8f1e9d0d92b8b6afe677ac42
-
SHA512
6173077eb54d7e7c3bf078e53dbe823b18ab40fd0a19156889b66cb216083d50ffa07633851cc10641ec614eed3377ddb9b430ab056ff969cd7b48939c5ec00b
-
SSDEEP
12288:xWxijZN+TUZ9J3s/CyqRVZlUrzy9dh6txmxFjGofzNIw93oOkKVCtM0J:kOx9dwQ3BIgoBK8MC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.2023-09-07_4ec6710308c646729b9c0bd1c565899a_icedid_JC.exe
Files
-
NEAS.2023-09-07_4ec6710308c646729b9c0bd1c565899a_icedid_JC.exe.exe windows:4 windows x86
0ea73809a207e44d87577b49202afe40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
GetACP
VirtualFree
HeapDestroy
HeapCreate
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
HeapFree
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetSystemTimeAsFileTime
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleOutputCP
WriteConsoleW
HeapAlloc
RtlUnwind
SetErrorMode
SetEndOfFile
FlushFileBuffers
WritePrivateProfileStringA
GetThreadLocale
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
GetSystemDirectoryA
DeviceIoControl
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
InterlockedDecrement
GetModuleFileNameW
SetLastError
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemInfo
GetProcessAffinityMask
SetFilePointer
ReadFile
DeleteFileA
GetComputerNameA
CreateMutexA
ReleaseMutex
GetCurrentProcess
GlobalAlloc
GlobalReAlloc
GlobalFree
GlobalSize
lstrcmpiA
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
lstrcatA
lstrlenA
WinExec
lstrcpyA
GetVersionExA
GetTempPathA
GetStdHandle
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
GlobalMemoryStatus
WriteConsoleA
CreateFileA
WriteFile
GetLastError
CreateThread
SetThreadPriority
Sleep
ExitThread
WaitForSingleObject
CloseHandle
GetCurrentDirectoryA
SetCurrentDirectoryA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetEnvironmentStrings
user32
DestroyMenu
UnregisterClassA
GetSysColorBrush
GetWindowThreadProcessId
PostQuitMessage
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetActiveWindow
ShowWindow
IsWindowEnabled
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetCapture
UnhookWindowsHookEx
EndPaint
BeginPaint
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
EmptyClipboard
SetClipboardData
CloseClipboard
GetDC
ReleaseDC
SetWindowLongA
LoadCursorA
CopyIcon
SetCursor
GetSysColor
LoadImageA
KillTimer
SetTimer
IsIconic
DrawIcon
OffsetRect
MessageBoxA
GetSystemMetrics
GetWindowDC
EnableWindow
OpenClipboard
GetClientRect
GetWindowRect
SendMessageA
LoadBitmapA
SetWindowsHookExA
gdi32
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
CreateBitmap
GetObjectA
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetSystemPaletteEntries
SelectPalette
RealizePalette
GetDIBits
GetDeviceCaps
CreatePalette
CreateFontIndirectA
GetStockObject
CreateFontA
GetTextExtentPoint32A
GetPixel
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyA
OpenSCManagerA
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
InitializeSecurityDescriptor
FreeSid
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
ImpersonateSelf
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantClear
VariantChangeType
VariantInit
SysStringLen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 484KB - Virtual size: 482KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ