Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_e31ec6aed2da06eb1eb8e699dc2e082d_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_e31ec6aed2da06eb1eb8e699dc2e082d_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_e31ec6aed2da06eb1eb8e699dc2e082d_icedid
-
Size
2.4MB
-
MD5
e31ec6aed2da06eb1eb8e699dc2e082d
-
SHA1
362a02f937bf8bce75eb7791ff3344efa5b17795
-
SHA256
f1399d7e9567ebb38cc11d064eaadfe84492541801ccb2d659933425633c4701
-
SHA512
60d0e91801bb98077a23f547c06cd3a72f7a3f08475b1e49a59a059c04ee84734d172d95085e0f62323064af3d7c15c632dd715951ab6bfd88773db95b57f0dd
-
SSDEEP
49152:YJZG+HUDseHsANFiRmIwQc4udDJ48oTZQNoCsa0qVpbwWxKVst/NYvRgJfoT71:X7DseHsANFi0IwQc4udDyTVEj+VC/N83
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-08_e31ec6aed2da06eb1eb8e699dc2e082d_icedid
Files
-
2024-01-08_e31ec6aed2da06eb1eb8e699dc2e082d_icedid.exe windows:4 windows x86 arch:x86
8efb630c5e6c352711452dfbea4145f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitProcess
HeapSize
GetACP
IsValidCodePage
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
HeapFree
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
RtlUnwind
GetTickCount
GetFileTime
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentDirectoryA
GetThreadLocale
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
GetModuleFileNameW
FormatMessageA
MulDiv
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetVersionExA
Sleep
SearchPathA
GetCurrentProcessId
GetFileSize
DeviceIoControl
LocalFree
LocalAlloc
ReadFile
GetModuleHandleA
WriteFile
CreateFileA
CloseHandle
SetErrorMode
SystemTimeToFileTime
GetSystemTime
GetLocalTime
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MoveFileA
lstrcpynA
lstrcatA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetProcAddress
FreeLibrary
LoadLibraryA
GetEnvironmentVariableA
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
GetLastError
MultiByteToWideChar
InterlockedExchange
GetModuleFileNameA
CreateProcessA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
FreeEnvironmentStringsW
SizeofResource
user32
RegisterClipboardFormatA
PostThreadMessageA
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
UnregisterClassA
LoadCursorA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
GetDesktopWindow
CreateDialogIndirectParamA
EndDialog
GetWindowThreadProcessId
GetCursorPos
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
ReleaseDC
GetDC
SetRectEmpty
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
LoadIconA
SetRect
PtInRect
CharUpperA
MessageBoxA
DestroyMenu
DestroyCursor
LoadImageA
GetSysColor
GetSubMenu
TrackPopupMenuEx
SetCursor
GetWindowLongA
EnableWindow
WindowFromPoint
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
GetClientRect
GetWindowRect
SendMessageA
DrawFocusRect
FrameRect
FillRect
OffsetRect
InflateRect
CopyRect
DrawStateA
DestroyIcon
IsWindow
gdi32
GetViewportExtEx
GetWindowExtEx
PtVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreatePen
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetBkMode
RestoreDC
SaveDC
MoveToEx
LineTo
SetMapMode
DeleteObject
ExtTextOutA
GetEnhMetaFilePaletteEntries
CreatePalette
SelectPalette
RealizePalette
PlayEnhMetaFile
SetEnhMetaFileBits
GetEnhMetaFileHeader
DeleteEnhMetaFile
GetDeviceCaps
SetWinMetaFileBits
RectVisible
GetClipBox
CreateRectRgnIndirect
ExtSelectClipRgn
SetStretchBltMode
SetDIBitsToDevice
CreateDIBSection
GetObjectA
GetDIBits
PatBlt
CreateCompatibleBitmap
CreateSolidBrush
CreateBitmap
CreateCompatibleDC
SelectObject
SetBkColor
BitBlt
SetTextColor
DeleteDC
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegQueryValueA
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegOpenKeyExA
shell32
ShellExecuteExA
comctl32
_TrackMouseEvent
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
CLSIDFromString
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 796KB - Virtual size: 792KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 216KB - Virtual size: 215KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ