Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_6dd8849219d30ff0da4c3ee281278360_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_6dd8849219d30ff0da4c3ee281278360_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_6dd8849219d30ff0da4c3ee281278360_icedid
-
Size
1.5MB
-
MD5
6dd8849219d30ff0da4c3ee281278360
-
SHA1
75be6fd3c1a6eb1be5a5ea2a1ce44318626ec1d4
-
SHA256
a002301a7d9d49c5e294c681266d9e13bdd54a730be04096248f9a52b49b3dff
-
SHA512
34656d56a6b2d8d505dc1c2e8cd8f0fa3b125699b44181ae71764317b735013dde9c9ac2de3f9737eb2ddb6185bd12b1edf7656c4f22e3d2889ede10c1ac0f64
-
SSDEEP
12288:IOAV6urcLTOfe0Y+IWs7HV9zL4wSKU1TKWy2ugvDN5Iey+tsQZBaW8RUhc5im66+:pAV6ui5+InrX8wSHTdyGDN5IeYM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-08_6dd8849219d30ff0da4c3ee281278360_icedid
Files
-
2024-01-08_6dd8849219d30ff0da4c3ee281278360_icedid.exe windows:5 windows x86 arch:x86
6734c472ad2dcae33f6926972c379a7d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dxwnd
ord7
ord14
ord8
ord3
ord11
ord9
ord2
ord1
ord12
ord6
ord13
ord5
ord4
shlwapi
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecW
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecA
kernel32
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationA
GlobalFlags
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
GetModuleHandleW
FileTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetFileSizeEx
SetErrorMode
RtlUnwind
RaiseException
ExitProcess
HeapReAlloc
HeapAlloc
FlushFileBuffers
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetCommandLineA
GetStartupInfoA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapSize
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
SetEnvironmentVariableW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
GetProcessHeap
GetThreadLocale
GetStringTypeExA
MoveFileA
GetDiskFreeSpaceA
GetTempFileNameA
GetFileTime
SetFileTime
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
GlobalSize
FormatMessageA
lstrlenW
lstrlenA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetFileAttributesA
GetCPInfoExA
GetVersion
MultiByteToWideChar
SetFilePointer
FreeResource
GlobalUnlock
GlobalFree
MulDiv
GlobalAlloc
SetEvent
ResetEvent
CreateSemaphoreA
Process32First
Process32Next
CreateEventA
OpenEventA
VirtualProtectEx
ReadProcessMemory
WriteProcessMemory
FlushInstructionCache
GetThreadContext
FindNextFileA
GetEnvironmentVariableA
SetEnvironmentVariableA
WaitForSingleObject
WaitForDebugEvent
GetFullPathNameA
ContinueDebugEvent
DebugSetProcessKillOnExit
DebugActiveProcessStop
GetFileSize
CreateFileMappingA
MapViewOfFile
GetLogicalDriveStringsA
QueryDosDeviceA
UnmapViewOfFile
FreeLibrary
FindFirstFileA
FindClose
GlobalLock
CreateMailslotA
OpenProcess
TerminateProcess
lstrcmpiA
GetShortPathNameA
GetLongPathNameA
CopyFileA
SetLastError
DeleteFileA
CreateThread
GetTickCount
ReadFile
Sleep
CreateToolhelp32Snapshot
Thread32First
OpenThread
ResumeThread
SuspendThread
Thread32Next
CreateProcessA
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileStringA
GetUserDefaultUILanguage
WideCharToMultiByte
CreateFileA
WriteFile
FindResourceA
SizeofResource
LoadResource
LockResource
LocalAlloc
LocalFree
GetCurrentProcess
GetVersionExA
GetLastError
WritePrivateProfileStringA
GetPrivateProfileIntA
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
CloseHandle
GetSystemTimeAsFileTime
user32
SetWindowContextHelpId
InflateRect
GetMenuItemInfoA
CharUpperA
IsClipboardFormatAvailable
GetSysColorBrush
IsRectEmpty
UnregisterClassA
CharNextA
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
MapDialogRect
ShowOwnedPopups
TranslateMessage
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
TranslateAcceleratorA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
IntersectRect
IsIconic
GetWindowPlacement
GetActiveWindow
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
LoadStringA
LoadCursorA
SetCursor
ShowCursor
GetMessageA
WindowFromPoint
OffsetRect
ReleaseCapture
SetCapture
GetWindowDC
RegisterWindowMessageA
DrawAnimatedRects
EnumChildWindows
GetClassNameA
TrackPopupMenu
SetMenuDefaultItem
IsWindow
SetForegroundWindow
SetParent
SetActiveWindow
RedrawWindow
GetMenuItemID
GetKeyState
MessageBeep
GetIconInfo
SetRect
CopyRect
FillRect
GetCursorPos
WindowFromDC
LoadStringW
MessageBoxExW
GetSystemMetrics
AdjustWindowRect
ReleaseDC
EnumWindows
GetWindowThreadProcessId
GetWindow
IsWindowVisible
DestroyMenu
LoadImageA
ClipCursor
UnregisterHotKey
RegisterHotKey
GetAncestor
ClientToScreen
LoadMenuA
GetSubMenu
GetMenuState
EnableMenuItem
CheckMenuItem
LoadBitmapA
SetSysColors
PostMessageA
EnumDisplaySettingsA
ChangeDisplaySettingsA
MessageBoxExA
GetSysColor
UpdateWindow
GetParent
GetClientRect
GetDC
GetDesktopWindow
SetMenu
GetMenu
SystemParametersInfoA
FindWindowA
InvalidateRect
GetWindowRect
LoadIconA
DestroyIcon
SendMessageA
KillTimer
SetTimer
EnableWindow
MessageBoxA
CreateDialogIndirectParamA
gdi32
ExtSelectClipRgn
CreatePatternBrush
SelectPalette
CreateRectRgnIndirect
GetTextExtentPoint32A
GetMapMode
SetViewportOrgEx
GetBkColor
GetTextColor
GetRgnBox
CreateFontIndirectA
Escape
ExtTextOutA
TextOutA
RectVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
CreateCompatibleBitmap
DeleteDC
SelectObject
BitBlt
GetPixel
SetDeviceGammaRamp
GetDeviceGammaRamp
DeleteObject
SetDIBitsToDevice
StretchDIBits
CreatePalette
GetDeviceCaps
GetPixelFormat
PtVisible
GetWindowExtEx
GetViewportExtEx
DescribePixelFormat
MoveToEx
LineTo
SetMapMode
SetStretchBltMode
SetBkMode
RestoreDC
SaveDC
CopyMetaFileA
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
Ellipse
CreatePen
GetStockObject
Rectangle
GetBitmapBits
GetObjectA
CreateSolidBrush
CreateCompatibleDC
OffsetViewportOrgEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
OpenProcessToken
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegSetValueA
RegCloseKey
GetTokenInformation
DuplicateToken
CreateWellKnownSid
CheckTokenMembership
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
shell32
SHGetFileInfoA
DragQueryPoint
SHAppBarMessage
SHChangeNotify
DragAcceptFiles
Shell_NotifyIconA
ExtractIconA
ShellExecuteA
ShellExecuteExA
DragQueryFileA
DragFinish
comctl32
ImageList_Create
oledlg
ord8
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CLSIDFromString
CLSIDFromProgID
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
OleGetClipboard
CoTaskMemFree
CreateStreamOnHGlobal
GetHGlobalFromStream
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
oleaut32
SysAllocString
OleCreateFontIndirect
OleLoadPicture
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantClear
SafeArrayDestroy
VariantCopy
OleCreatePictureIndirect
SysAllocStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
VariantInit
VariantChangeType
Sections
.text Size: 448KB - Virtual size: 447KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 885KB - Virtual size: 884KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ