Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_05415fc6e09c0673d8d1d5a819f7d85a_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_05415fc6e09c0673d8d1d5a819f7d85a_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_05415fc6e09c0673d8d1d5a819f7d85a_icedid
-
Size
460KB
-
MD5
05415fc6e09c0673d8d1d5a819f7d85a
-
SHA1
3adcab412c58eed8c473ca35b05169c8b664d52e
-
SHA256
3dd5eba2603ebc11ed3915bf61cc6ba9a6ebd49adbadc9d77871860404c22c13
-
SHA512
4ec6856eb265dc1ba24a16706187f57dca2295e7e6bfda1c06ec75647dff8e88e64cdb1227740b441f4df24e2e30e1c8ab64874f4eeeb6bba8c02ad39ba218fd
-
SSDEEP
6144:fM3KqT4CrT1wnf316uWP1qPHA3BmFXEF44WuCStNjuhcccbVz4RAO1FwRFjt4:IKqzefF6us0rEF44WtSiCXBz4Rts4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-09_05415fc6e09c0673d8d1d5a819f7d85a_icedid
Files
-
2024-01-09_05415fc6e09c0673d8d1d5a819f7d85a_icedid.exe windows:5 windows x86 arch:x86
6ad0da0d5d71ac4a20899b30d5bc8adf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetCommandLineA
GetStartupInfoA
GetTimeFormatA
GetDateFormatA
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
HeapSize
Sleep
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
HeapCreate
VirtualFree
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetStdHandle
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetExitCodeProcess
CreateProcessA
CompareStringW
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
GetProcessHeap
GetFileAttributesA
CreateFileA
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
GetOEMCP
GetCPInfo
GetLocaleInfoA
WaitForSingleObject
CloseHandle
GetModuleHandleW
GlobalFlags
lstrcmpA
GetCurrentProcessId
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
InterlockedIncrement
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
InterlockedDecrement
FormatMessageA
MulDiv
lstrlenA
GetVersionExA
GetModuleHandleA
WideCharToMultiByte
GetLastError
SetLastError
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
SizeofResource
GetShortPathNameA
LocalAlloc
LocalLock
LocalUnlock
GetCommandLineW
GetPrivateProfileIntA
WritePrivateProfileStringA
GlobalAlloc
GlobalLock
lstrcpyA
GlobalUnlock
GlobalFree
LoadLibraryA
GetProcAddress
FreeLibrary
LocalFree
GetModuleFileNameA
user32
GetKeyState
SetForegroundWindow
UpdateWindow
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
CopyRect
GetDlgCtrlID
PtInRect
GetMenu
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
UnhookWindowsHookEx
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
RegisterWindowMessageA
IsWindowEnabled
GetParent
AppendMenuA
GetMenuItemCount
GetMenuItemID
GetWindowTextLengthA
GetClientRect
RemoveMenu
GetMenuStringA
ScreenToClient
InvalidateRect
MonitorFromRect
LoadMenuA
CreateWindowExA
SetMenu
ShowWindow
LoadAcceleratorsA
GetMessageA
IsDialogMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
RegisterClassA
IsWindow
CreateDialogParamA
GetFocus
IsClipboardFormatAvailable
DialogBoxParamA
DefWindowProcA
GetWindowRect
PostQuitMessage
BeginPaint
EndPaint
MoveWindow
GetDlgItemInt
LoadStringA
MessageBoxA
SetWindowTextA
GetWindowLongA
SetWindowLongA
GetWindowTextA
CallWindowProcA
MessageBeep
UnregisterClassA
DestroyMenu
OpenClipboard
PostMessageA
SendDlgItemMessageA
EndDialog
EmptyClipboard
SetClipboardData
CloseClipboard
SetFocus
IsDlgButtonChecked
CheckDlgButton
CheckMenuItem
DestroyWindow
GetSysColor
DrawFocusRect
GetDC
ReleaseDC
SetDlgItemTextA
GetDlgItem
SendMessageA
EnableWindow
GetDlgItemTextA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ValidateRect
GetSysColorBrush
ClientToScreen
GetWindowThreadProcessId
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
GetSubMenu
MapWindowPoints
gdi32
SetMapMode
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
DeleteObject
GetObjectA
GetClipBox
SetBkColor
GetDeviceCaps
CreateBitmap
ScaleViewportExtEx
GetTextMetricsA
SetTextColor
ExtTextOutA
SelectObject
CreateFontA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegQueryValueA
RegSetValueA
shell32
ShellExecuteA
CommandLineToArgvW
ole32
CoInitializeEx
CoCreateInstance
CoTaskMemFree
CoUninitialize
oleaut32
VariantInit
VariantChangeType
VariantClear
shlwapi
PathRemoveFileSpecW
PathFindExtensionA
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 314KB - Virtual size: 314KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 482KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ