Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_948098a578ee18eb1e89c8aab4c2560a_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_948098a578ee18eb1e89c8aab4c2560a_icedid_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-06_948098a578ee18eb1e89c8aab4c2560a_icedid_JC.exe
-
Size
1.4MB
-
MD5
948098a578ee18eb1e89c8aab4c2560a
-
SHA1
91ff59ade077317aa040c46c0c5f68f3350eea2e
-
SHA256
febf7ebe3146b9d17def50bef88ac46ef38f57e6b3ee2c10dc84d51068fd7778
-
SHA512
a0c0046fa5acbda79e6408f2e84809af8cdaa4ace636f0ca7d9429e7d7045332ae225f4dc27416bbc07ff363cdafc37b6e807e04147555baa67dfe846483e83c
-
SSDEEP
12288:LeAG61lWLDTqv0R+SudVpXdiURXgsKjqYx:LeAG61yqv0ReftiURgnjqq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.2023-09-06_948098a578ee18eb1e89c8aab4c2560a_icedid_JC.exe
Files
-
NEAS.2023-09-06_948098a578ee18eb1e89c8aab4c2560a_icedid_JC.exe.exe windows:4 windows x86
90c20ccd8694c19cca7e64a26c8e878e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathRemoveExtensionA
PathFindFileNameA
StrToIntExA
PathFileExistsA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
GetTimeZoneInformation
CreateThread
GetStringTypeW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
ExitThread
HeapAlloc
HeapFree
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
RtlUnwind
SetErrorMode
GetOEMCP
GetCPInfo
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetShortPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentDirectoryA
SystemTimeToFileTime
FileTimeToSystemTime
GlobalFlags
GetProfileIntA
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
LocalAlloc
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcatA
lstrcmpW
FreeResource
GlobalReAlloc
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
lstrcmpA
SetLastError
GlobalFree
CopyFileA
MulDiv
GlobalSize
FormatMessageA
LocalFree
LoadLibraryA
GetProcAddress
GetStringTypeExA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetModuleHandleA
Sleep
DeleteFileA
MoveFileA
GetLastError
SetCurrentDirectoryA
GetLocalTime
GlobalAlloc
GlobalLock
GetTickCount
CreateFileA
GetModuleFileNameA
CreateEventA
CloseHandle
WaitForSingleObject
lstrcpynA
SetEvent
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedDecrement
InterlockedIncrement
GlobalUnlock
GetCurrentProcessId
lstrlenW
WideCharToMultiByte
GetVersionExA
GetStringTypeA
user32
SetParent
PostThreadMessageA
DestroyIcon
FindWindowA
LockWindowUpdate
GetDCEx
DeleteMenu
GetSysColorBrush
GetMenuItemInfoA
ShowOwnedPopups
DestroyCursor
SetCursorPos
RedrawWindow
UnionRect
IsRectEmpty
IsZoomed
ValidateRect
DestroyMenu
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
GetCursorPos
ReleaseCapture
SetCursor
WindowFromPoint
SetCapture
wsprintfA
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
MessageBoxA
TrackPopupMenu
GetKeyState
SetScrollPos
GetScrollPos
IsWindowVisible
GetMenu
AdjustWindowRectEx
DeferWindowPos
GetClassInfoA
RegisterClassA
GetDlgCtrlID
CallWindowProcA
SetWindowLongA
SendMessageA
LoadImageA
GetWindowRect
KillTimer
EnableWindow
LoadBitmapA
IsIconic
SetTimer
GetFocus
GetParent
EnableMenuItem
UpdateWindow
SetActiveWindow
SetForegroundWindow
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetSysColor
GetWindowDC
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetMenuItemBitmaps
ModifyMenuA
CheckMenuItem
GetMenuCheckMarkDimensions
IsClipboardFormatAvailable
PostMessageA
ReleaseDC
GetDC
CopyRect
GetMenuState
GetMenuStringA
GetMenuItemID
InsertMenuA
GetMenuItemCount
InvalidateRect
RegisterClipboardFormatA
GetSubMenu
LoadMenuA
GetClientRect
ClientToScreen
SetWindowContextHelpId
IsWindow
UnregisterClassA
ShowWindow
CreateWindowExA
DestroyWindow
DefWindowProcA
PostQuitMessage
EndPaint
BeginPaint
GetForegroundWindow
RegisterClassExA
LoadCursorA
TranslateMessage
DispatchMessageA
GetMessageA
GetSystemMetrics
SetRect
InflateRect
EqualRect
CharUpperA
SetPropA
gdi32
CreateFontIndirectA
SetRectRgn
CombineRgn
GetTextExtentPoint32A
GetTextMetricsA
CreateFontA
GetCharWidthA
StretchDIBits
GetBkColor
CreateCompatibleBitmap
CreateSolidBrush
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
CreatePatternBrush
ScaleWindowExtEx
ScaleViewportExtEx
SetWindowExtEx
BitBlt
CreateCompatibleDC
GetObjectA
RectVisible
PtVisible
GetPixel
CreateRectRgn
SelectClipRgn
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
PatBlt
CreateRectRgnIndirect
CopyMetaFileA
SelectObject
DeleteObject
GetStockObject
Ellipse
CreateDCA
GetDeviceCaps
DeleteDC
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegOpenKeyExA
GetUserNameA
RegSetValueA
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
SetFileSecurityA
GetFileSecurityA
RegCreateKeyA
RegQueryValueExA
shell32
ExtractIconA
SHGetFileInfoA
DragQueryFileA
DragFinish
DragAcceptFiles
comctl32
ImageList_BeginDrag
ImageList_EndDrag
ImageList_AddMasked
ImageList_DragMove
ImageList_DragShowNolock
ImageList_DragEnter
ImageList_DragLeave
ImageList_Read
ImageList_Write
ImageList_Destroy
ImageList_LoadImageA
ord17
ImageList_Draw
ImageList_SetOverlayImage
ImageList_GetImageInfo
oledlg
ord8
ole32
OleGetClipboard
OleDuplicateData
ReleaseStgMedium
CoTaskMemAlloc
StringFromCLSID
OleIsCurrentClipboard
CoTaskMemFree
OleRun
CoCreateInstance
CoRegisterMessageFilter
OleFlushClipboard
CoRegisterClassObject
CoRevokeClassObject
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
RegisterDragDrop
CoLockObjectExternal
RevokeDragDrop
DoDragDrop
CoDisconnectObject
CreateStreamOnHGlobal
oleaut32
GetErrorInfo
LoadTypeLi
SysFreeString
SysAllocStringByteLen
SysStringByteLen
VarBstrFromDate
SysAllocStringLen
SystemTimeToVariantTime
SysStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SysAllocString
Sections
.text Size: 272KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ