Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_b16e9dee1b5b0d65ed4b00f65020fae9_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_b16e9dee1b5b0d65ed4b00f65020fae9_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_b16e9dee1b5b0d65ed4b00f65020fae9_icedid
-
Size
1.2MB
-
MD5
b16e9dee1b5b0d65ed4b00f65020fae9
-
SHA1
8ffc325d1578a21c929250ed43be5d3cc868b8de
-
SHA256
430517fc17cc59645b65449a0dc3bbbf797ff55c798b1f4473740117a416f0e9
-
SHA512
cee77c456447c7e527b49f2e3cbaee22d2d19d4c55381852da90aed65a35da740395c40b891c484e7fcfaa462ce3a466115b4f4adf77ccf5d67d523264953e83
-
SSDEEP
12288:vYfmahFFETrx6mQGdvmZHi08nO86k9gh+RvBtQm4JnEhgt6zcwrfC:wfmQFqTrx5QGAs06V6Ib18nEhxzrO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-01_b16e9dee1b5b0d65ed4b00f65020fae9_icedid
Files
-
2024-01-01_b16e9dee1b5b0d65ed4b00f65020fae9_icedid.exe windows:4 windows x86 arch:x86
51aeecb8b79de37eb853ee8d9e7cd9e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
VirtualQuery
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
IsBadWritePtr
SetUnhandledExceptionFilter
VirtualAlloc
GetOEMCP
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
GetDriveTypeA
CompareStringA
CompareStringW
SetEnvironmentVariableA
VirtualProtect
HeapReAlloc
HeapAlloc
HeapFree
TerminateProcess
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
GetStartupInfoW
GetFileTime
GetFileAttributesW
SetErrorMode
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedIncrement
GetCurrentDirectoryW
GetFullPathNameW
GetVolumeInformationW
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
lstrcmpiW
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GlobalGetAtomNameW
FormatMessageW
LocalFree
FindFirstFileW
GetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
GlobalFindAtomW
lstrlenA
lstrcatW
GetVersionExA
MulDiv
SetLastError
lstrcpynW
InterlockedDecrement
GlobalAddAtomW
GlobalUnlock
GlobalFree
FreeResource
lstrlenW
GetCurrentThread
GetCurrentThreadId
GlobalLock
lstrcmpW
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
WideCharToMultiByte
GetModuleHandleW
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcpyW
GetLocaleInfoW
LoadLibraryW
MultiByteToWideChar
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LoadLibraryA
VirtualFree
ResumeThread
SetThreadContext
WriteProcessMemory
GetCurrentProcess
DuplicateHandle
VirtualAllocEx
GetProcAddress
GetModuleHandleA
ReadProcessMemory
GetThreadContext
CreateProcessW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
CloseHandle
CreateFileW
FindResourceW
LoadResource
LockResource
SizeofResource
GetTimeZoneInformation
GetModuleFileNameW
user32
CharUpperW
DeleteMenu
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsW
InsertMenuItemW
BringWindowToTop
SetMenu
TranslateAcceleratorW
WinHelpW
CreateWindowExW
GetClassInfoExW
GetClassLongW
SetPropW
GetPropW
RemovePropW
SendDlgItemMessageA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
MessageBoxW
GetMenu
AdjustWindowRectEx
GetClassInfoW
RegisterClassW
UnregisterClassW
DefWindowProcW
CallWindowProcW
IntersectRect
SystemParametersInfoA
GetWindowPlacement
BeginPaint
GetWindowDC
FillRect
SetWindowPos
ShowWindow
MoveWindow
SetWindowLongW
GetDlgCtrlID
IsDialogMessageW
IsDlgButtonChecked
SetDlgItemTextW
SendDlgItemMessageW
CheckDlgButton
GetMenuStringW
WindowFromPoint
GetMenuItemInfoW
wsprintfW
GetWindowTextLengthW
GetWindow
SetFocus
UnhookWindowsHookEx
ShowOwnedPopups
SetCursor
SetWindowsHookExW
CallNextHookEx
TranslateMessage
IsWindowVisible
ValidateRect
SetMenuItemBitmaps
GetFocus
GetMenuState
EnableMenuItem
GetMenuCheckMarkDimensions
LoadIconW
GetSystemMenu
AppendMenuW
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageW
GetWindowRect
CreatePopupMenu
CheckMenuItem
EnableWindow
LoadBitmapW
GetSysColor
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
PostQuitMessage
ModifyMenuW
GetMenuItemCount
SetWindowTextW
GetWindowTextW
SetActiveWindow
GetSysColorBrush
SetRect
RedrawWindow
DrawAnimatedRects
EnumChildWindows
FindWindowW
GetClassNameW
GetMenuItemID
TrackPopupMenu
SetForegroundWindow
SetMenuDefaultItem
DestroyIcon
LoadImageW
RegisterWindowMessageW
ReleaseDC
LockWindowUpdate
DestroyMenu
GetDCEx
DrawFocusRect
DrawStateW
RegisterClipboardFormatW
GetIconInfo
CopyIcon
CreateIconIndirect
DestroyCursor
OffsetRect
GetCapture
SetCapture
SetTimer
PtInRect
InvalidateRect
PeekMessageW
GetMessageW
GetDC
GetSubMenu
LoadMenuW
ClientToScreen
EndDeferWindowPos
BeginDeferWindowPos
DeferWindowPos
EqualRect
PostMessageW
GetKeyState
SetParent
GetParent
IsChild
IsWindow
UpdateWindow
SetRectEmpty
CopyRect
InflateRect
SystemParametersInfoW
IsRectEmpty
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
LoadCursorW
DestroyWindow
ScreenToClient
GetCursorPos
KillTimer
ReleaseCapture
DispatchMessageW
EndPaint
gdi32
GetDeviceCaps
SetRectRgn
CombineRgn
GetBkColor
GetStockObject
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
DeleteObject
SetViewportOrgEx
GetPixel
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetObjectW
CreateBitmap
PatBlt
CreateRectRgnIndirect
GetTextMetricsW
GetTextExtentPoint32W
CreatePen
CreateFontIndirectW
GetMapMode
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
Polygon
CreateSolidBrush
SelectObject
CreateCompatibleBitmap
GetTextColor
EnumFontFamiliesExW
GetTextCharsetInfo
SetPixel
CreateDIBSection
GetDIBits
SetDIBits
CreatePolygonRgn
GetRgnBox
CreateRectRgn
CreateCompatibleDC
BitBlt
SelectClipRgn
comdlg32
GetSaveFileNameW
GetFileTitleW
GetOpenFileNameW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegEnumKeyW
RegOpenKeyW
RegQueryValueW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
shell32
SHAppBarMessage
DragFinish
DragQueryFileW
Shell_NotifyIconW
comctl32
_TrackMouseEvent
ImageList_Draw
ImageList_GetIcon
ImageList_GetImageInfo
ImageList_Destroy
ImageList_Create
ImageList_LoadImageW
ImageList_Add
ord17
shlwapi
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
PathIsUNCW
ole32
CoDisconnectObject
oleaut32
SysFreeString
SysStringLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SysAllocString
LoadTypeLi
ws2_32
htons
WSAStartup
WSACleanup
closesocket
socket
inet_addr
gethostbyname
WSAGetLastError
send
setsockopt
recv
connect
Sections
.text Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 444KB - Virtual size: 441KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vdata0 Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ