Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_45c7f305a6d1e9a7dbfc3570707228ed_icedid_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_45c7f305a6d1e9a7dbfc3570707228ed_icedid_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.2023-09-06_45c7f305a6d1e9a7dbfc3570707228ed_icedid_JC.exe
-
Size
1.3MB
-
MD5
45c7f305a6d1e9a7dbfc3570707228ed
-
SHA1
651dabcc44d93ad8d921a0342d1c158a591d545a
-
SHA256
e9492cefe6837ec2cde16a7684354c29d9a367742be29d13b597004e2e751373
-
SHA512
a4963be1cea71313caa1e09034a524eec28a69efb548483b09524a119eb39eb8a3f0d5d50b92b860f91666a3f34cdf0b48478c978fa9e5739b0cb748d1477169
-
SSDEEP
12288:aKmAzmh7F9KjctMnXNlVrTSCgojGkdwJ3NZfdwwYhIMitVpGkidYD7AvUv2RpN9r:aKmAiH97td3YhitV6dY/mUk69TTWEOH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.2023-09-06_45c7f305a6d1e9a7dbfc3570707228ed_icedid_JC.exe
Files
-
NEAS.2023-09-06_45c7f305a6d1e9a7dbfc3570707228ed_icedid_JC.exe.exe windows:4 windows x86
775f32a61a89eeff041455613680a2f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
SetCurrentDirectoryA
FindNextFileA
TerminateProcess
GetSystemTimeAsFileTime
GetStartupInfoA
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetCurrentProcessId
SetUnhandledExceptionFilter
LCMapStringW
SetHandleCount
GetFileType
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
SetEnvironmentVariableA
CreateDirectoryA
GetDiskFreeSpaceA
SetErrorMode
GetOEMCP
GetCPInfo
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFlags
GetCurrentDirectoryA
WritePrivateProfileStringA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
RaiseException
GetFileTime
GetFileSize
CreateFileA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FreeResource
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
CloseHandle
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
CreateThread
LeaveCriticalSection
EnterCriticalSection
QueryPerformanceCounter
GetCommandLineA
IsProcessorFeaturePresent
GetStdHandle
SetConsoleTextAttribute
GetComputerNameA
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
FindFirstFileA
FindClose
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
Sleep
DeleteCriticalSection
InitializeCriticalSection
GetDriveTypeA
DeleteFileA
CopyFileA
FormatMessageA
LocalFree
GetFileAttributesA
SetFileAttributesA
WinExec
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
LCMapStringA
InterlockedExchange
RemoveDirectoryA
user32
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
GetMenu
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
IsIconic
GetWindowPlacement
EndPaint
BeginPaint
GetWindowDC
ScreenToClient
UnhookWindowsHookEx
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
SetWindowsHookExA
MapDialogRect
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
RegisterWindowMessageA
IsWindowEnabled
ShowOwnedPopups
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetActiveWindow
GetLastActivePopup
PeekMessageA
FillRect
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
IsRectEmpty
MessageBeep
GetCursorPos
IsWindow
SetCursor
KillTimer
SetTimer
GetClassNameA
ClientToScreen
GetDlgCtrlID
CharNextA
LoadMenuA
UnpackDDElParam
ReuseDDElParam
CharUpperA
LoadAcceleratorsA
MoveWindow
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
LoadCursorA
SystemParametersInfoA
GetWindow
ReleaseDC
GetDC
PtInRect
CopyRect
GetSystemMetrics
GetSysColor
DestroyCursor
GetParent
GetWindowLongA
AdjustWindowRect
PostQuitMessage
LoadIconA
InvalidateRect
PostThreadMessageA
GetNextDlgGroupItem
UpdateWindow
GetClientRect
GetWindowRect
GetSystemMenu
SendMessageA
AppendMenuA
LoadBitmapA
PostMessageA
GetMessageA
MessageBoxA
EnableWindow
RegisterClipboardFormatA
ValidateRect
SetWindowContextHelpId
TranslateAcceleratorA
InvalidateRgn
CopyAcceleratorTableA
SetRect
GetSysColorBrush
WindowFromPoint
ReleaseCapture
SetCapture
SetWindowRgn
DrawIcon
FindWindowA
wsprintfA
DestroyMenu
GetMenuItemInfoA
InflateRect
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
ShowWindow
SetWindowTextA
IsDialogMessageA
CallNextHookEx
gdi32
SetTextColor
SetMapMode
GetClipBox
ExcludeClipRect
LineTo
MoveToEx
DeleteObject
GetViewportExtEx
GetWindowExtEx
GetPixel
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ExtSelectClipRgn
CreateRectRgnIndirect
CreateEllipticRgn
LPtoDP
Ellipse
GetRgnBox
GetBkColor
GetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
CreateSolidBrush
CreatePen
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetMapMode
GetTextExtentPoint32A
GetStockObject
GetTextCharsetInfo
EnumFontFamiliesExA
CreateBitmap
CreateFontIndirectA
CreatePatternBrush
CreateCompatibleBitmap
SelectObject
DeleteDC
BitBlt
CreateCompatibleDC
ScaleWindowExtEx
GetObjectA
CreateFontA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoRegisterMessageFilter
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocString
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
SysFreeString
winmm
timeGetTime
ws2_32
closesocket
recv
send
socket
setsockopt
ioctlsocket
__WSAFDIsSet
gethostbyname
WSAGetLastError
connect
htons
inet_addr
htonl
bind
WSAStartup
WSACleanup
select
oleacc
AccessibleObjectFromWindow
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 396KB - Virtual size: 393KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 28KB - Virtual size: 464KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 804KB - Virtual size: 802KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.khe Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE