Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_559fefba7ff18dc4576545203e1e4af9_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_559fefba7ff18dc4576545203e1e4af9_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_559fefba7ff18dc4576545203e1e4af9_icedid
-
Size
2.8MB
-
MD5
559fefba7ff18dc4576545203e1e4af9
-
SHA1
a53baf4506cd5dbcebbe2e734a1eade9a07497c6
-
SHA256
27ef6b77aaa268aa77adfb44aefd682ee116b0552488bc465964d1ec93faae81
-
SHA512
e49c8724d1ca61f9fcfdf44e374d88bca30706ab66bfa3d93eff5e11988022ec48666c4eb952e3df3fff54baa4e8d886076db15fa567147d4a0011306a755ae5
-
SSDEEP
24576:vD2uEulsDunVA/OzhKv4sNODexSgLydTS8PZvPmQSRe0mcspT+9Af3nMgk4eCaVH:vntAYh4No09spT+9Af3nMrBC2H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-09_559fefba7ff18dc4576545203e1e4af9_icedid
Files
-
2024-01-09_559fefba7ff18dc4576545203e1e4af9_icedid.exe windows:4 windows x86 arch:x86
da34997fb0cf7fd9477b09094d9ca452
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
mwic_32
srd_1604b
chk_24c04
chk_24c02
chk_24c01a
chk_1604b
chk_1604
srd_4442
csc_4442
chk_4442
ic_exit
get_status
ic_init
swr_4442
chk_102
chk_24c16
chk_24c64
chk_4404
chk_4406
hex_asc
srd_93c46
srd_4432
srd_4428
srd_4418
srd_4406
srd_4404
srd_24c64
srd_24c16
srd_24c08
srd_24c04
srd_24c02
srd_24c01a
chk_24c08
srd_1604
srd_102
csc_4428
csc_4406
csc_4404
csc_1604b
csc_1604
csc_102
chk_93c46
chk_4432
chk_4428
chk_4418
winio
InitializeWinIo
UnmapPhysicalMemory
ShutdownWinIo
SetPhysLong
GetPhysLong
SetPortVal
MapPhysToLin
kernel32
CreateFileA
WriteFile
ReadFile
SetCommState
GetCommState
FlushFileBuffers
ClearCommBreak
ClearCommError
HeapFree
HeapAlloc
GetProcessHeap
InterlockedExchange
MultiByteToWideChar
GetVersion
CompareStringA
CompareStringW
lstrlenA
SetErrorMode
FreeResource
GlobalFree
GlobalUnlock
GlobalLock
GetModuleHandleA
lstrcmpW
SetLastError
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
DeviceIoControl
GlobalAlloc
GetModuleFileNameW
InterlockedDecrement
GetModuleFileNameA
FileTimeToSystemTime
lstrcmpA
LoadLibraryExA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
SetThreadPriority
SetEvent
SuspendThread
CreateEventA
InterlockedIncrement
GetThreadLocale
FindNextFileA
FileTimeToLocalFileTime
SetFilePointer
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
GlobalFlags
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
GetFileAttributesA
GetFileTime
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
GetTimeFormatA
GetDateFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetStartupInfoA
SetStdHandle
GetFileType
ExitThread
CreateThread
HeapSize
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetConsoleCP
GetConsoleMode
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
InitializeCriticalSection
ResumeThread
GetSystemTime
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetFileAttributesExA
SetLocalTime
GetCurrentProcessId
WaitForSingleObject
TerminateProcess
CloseHandle
GetPrivateProfileIntA
GetPrivateProfileStringA
FindFirstFileA
FindClose
CreateDirectoryA
CopyFileA
WritePrivateProfileStringA
MoveFileA
LocalAlloc
GetCurrentDirectoryA
WinExec
RemoveDirectoryA
SetFileAttributesA
DeleteFileA
GetUserDefaultLCID
CreateProcessA
GetExitCodeProcess
GetComputerNameA
GetVersionExA
GetCurrentProcess
GetLastError
FormatMessageA
LocalFree
GetLocalTime
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
GetTickCount
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
MulDiv
user32
RegisterClipboardFormatA
PostThreadMessageA
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
CharNextA
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
MessageBeep
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
ReleaseCapture
SetCapture
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
CharUpperA
SetDlgItemTextA
SetForegroundWindow
GetAsyncKeyState
LoadIconA
KillTimer
SetTimer
InvalidateRect
DrawIcon
EnumWindows
keybd_event
IsWindow
WaitForInputIdle
MessageBoxA
ExitWindowsEx
LoadBitmapA
GetWindowThreadProcessId
SwitchToThisWindow
FindWindowA
GetWindowTextA
PostMessageA
UnhookWindowsHookEx
SetWindowsHookExA
GetSystemMetrics
GetClassNameA
GetWindow
GetClientRect
GetWindowRect
EnableWindow
SendMessageA
GetFocus
PtInRect
gdi32
SetMapMode
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
BitBlt
SelectObject
CreateCompatibleDC
GetObjectA
GetRgnBox
GetMapMode
GetTextColor
GetBkColor
CreateRectRgnIndirect
GetStockObject
DeleteDC
ExtSelectClipRgn
CreateFontA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
LookupPrivilegeValueA
OpenProcessToken
InitiateSystemShutdownA
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegCreateKeyExA
AdjustTokenPrivileges
shlwapi
PathFindExtensionA
PathStripToRootA
PathFileExistsA
PathFindFileNameA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromProgID
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysFreeString
SysStringLen
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
VariantCopy
SysAllocString
SafeArrayDestroy
SysAllocStringByteLen
ws2_32
inet_ntoa
WSASocketA
recvfrom
sendto
WSAStartup
setsockopt
gethostbyname
WSACleanup
shutdown
WSAGetLastError
htons
inet_addr
socket
connect
closesocket
send
recv
odbc32
ord31
ord9
ord75
ord24
ord76
ord36
ord32
ord41
ord16
ord11
ord4
ord13
ord29
ord61
ord18
ord39
ord15
winmm
PlaySoundA
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 380KB - Virtual size: 379KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 352KB - Virtual size: 387KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ