Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_b9f40810d617314cd1236db8719bbd00_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-06_b9f40810d617314cd1236db8719bbd00_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_b9f40810d617314cd1236db8719bbd00_icedid
-
Size
8.4MB
-
MD5
b9f40810d617314cd1236db8719bbd00
-
SHA1
2cbbbc6cbd4af30bc667aad47338accb19e87ae8
-
SHA256
fd1793d4abe979ed9f474de1a14c31ac7912534793f7d82cacedba4d36129acd
-
SHA512
48770276a50bf12672f4df69998ff50157fd51b26ddd3bdb001a441815311a70c012ce348ba84616f62c1e71569e254d578f9f7f409d94acc7e7a303ed900a2a
-
SSDEEP
196608:S+PdotDfJhpmki7RxzEJm1m/SyZaIdPi59X6PS1AC0v5+pdsxtnX:ARhpmVFxzEJm1mlXiKPBvY6TX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-06_b9f40810d617314cd1236db8719bbd00_icedid
Files
-
2024-01-06_b9f40810d617314cd1236db8719bbd00_icedid.exe windows:4 windows x86 arch:x86
3b19643f053e5c0b9931df2469230787
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetHandleCount
GetStdHandle
SetStdHandle
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetDriveTypeA
IsBadWritePtr
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
VirtualFree
HeapCreate
HeapDestroy
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapSize
TerminateProcess
HeapReAlloc
GetCommandLineA
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
CreateThread
ExitThread
RtlUnwind
GetFileType
HeapFree
HeapAlloc
ExitProcess
GetTickCount
GetCurrentDirectoryA
GetFileTime
SetErrorMode
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedDecrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetModuleHandleA
FreeResource
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
GetModuleFileNameA
GetCurrentThread
LocalAlloc
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
GetSystemDirectoryA
CopyFileA
GetPrivateProfileStringA
GetPrivateProfileIntA
MoveFileExA
WritePrivateProfileStringA
GetTempPathA
WaitForSingleObject
GetExitCodeProcess
GetWindowsDirectoryA
CreateProcessA
DeleteFileA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
CreateDirectoryA
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
lstrcatA
GetLastError
FindFirstFileA
FindNextFileA
FindClose
lstrlenA
lstrcpyA
CreateFileA
FileTimeToLocalFileTime
GetFileAttributesA
GetCurrentProcess
LocalFree
CloseHandle
GetStringTypeA
user32
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
IsWindowVisible
GetWindowDC
GetMenu
PostMessageA
GetSysColor
AdjustWindowRectEx
EqualRect
SendMessageA
GetParent
EnableWindow
MessageBoxA
ExitWindowsEx
DestroyMenu
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
BeginPaint
EndPaint
wsprintfA
SetCursor
ValidateRect
GetCursorPos
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
LoadIconA
GetClientRect
IsIconic
DrawIcon
CharUpperA
TranslateMessage
GetMessageA
MapDialogRect
SetWindowContextHelpId
GetSysColorBrush
UpdateWindow
LoadCursorA
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
SetForegroundWindow
SetCapture
PostQuitMessage
gdi32
ExtSelectClipRgn
DeleteDC
GetStockObject
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
LookupPrivilegeValueA
FreeSid
OpenProcessToken
SetNamedSecurityInfoA
SetEntriesInAclA
AllocateAndInitializeSid
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RegQueryValueA
RegDeleteKeyA
AdjustTokenPrivileges
ImpersonateSelf
OpenThreadToken
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
shell32
SHBrowseForFolderA
ShellExecuteA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
comctl32
ord17
ImageList_Destroy
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
oledlg
ord8
ole32
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StgOpenStorageOnILockBytes
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocString
OleCreateFontIndirect
SysStringLen
cabinet
ord22
ord21
ord23
ord20
Sections
.text Size: 180KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8.1MB - Virtual size: 8.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE