Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_d37eec514c7c207381da6d0680b13745_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-09_d37eec514c7c207381da6d0680b13745_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_d37eec514c7c207381da6d0680b13745_icedid
-
Size
308KB
-
MD5
d37eec514c7c207381da6d0680b13745
-
SHA1
5fffdb46b204920bb25ac2b7f243ba1b6f5dcd36
-
SHA256
a7827353650c3c2634bf8d6251c7c002179debd4230b403a30143399dd70c062
-
SHA512
9666f107c3021abf8f69cf9ac98f41956d9db62a038384fcc75196cbed2b6b2331f03daced064963eb6a8de7d331720ec8a20f62a5a71442c8e3a2c707f34c8e
-
SSDEEP
6144:Pd+bPd2U1px/2JAuuwxnOFhWQTqefcQR/6F3jwtt3:F+bV2Urx+JAw8FzTaQTtt3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-09_d37eec514c7c207381da6d0680b13745_icedid
Files
-
2024-01-09_d37eec514c7c207381da6d0680b13745_icedid.exe windows:4 windows x86 arch:x86
253227e908411f31d7cc91ec82805329
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
VirtualQuery
GetSystemInfo
VirtualAlloc
HeapFree
HeapAlloc
RtlUnwind
GetTickCount
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
SetErrorMode
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
FileTimeToSystemTime
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
FindResourceExA
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
InterlockedDecrement
SetLastError
MulDiv
GlobalAlloc
FormatMessageA
LocalFree
GlobalLock
GlobalUnlock
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
GetModuleHandleA
lstrcpynA
GlobalFree
VirtualProtect
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
CreateMutexA
GetLastError
DeviceIoControl
CloseHandle
CreateFileA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
QueryPerformanceCounter
InterlockedExchange
user32
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
ReleaseCapture
SetCapture
CharNextA
DestroyMenu
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
SetWindowContextHelpId
GetMessageA
TranslateMessage
GetCursorPos
SetCursor
PostQuitMessage
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
WinHelpA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
IsChild
PostThreadMessageA
GetLastActivePopup
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
GetSubMenu
EnableWindow
wsprintfA
RegisterWindowMessageA
SendMessageA
CharUpperA
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
ValidateRect
EnableMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
GetClassInfoA
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
RegisterClipboardFormatA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
CopyRect
PtInRect
GetWindow
GetWindowTextA
MoveWindow
SetWindowLongA
GetDlgCtrlID
GetForegroundWindow
ModifyMenuA
GetParent
GetFocus
SetMenuItemBitmaps
IsWindowEnabled
GetDlgItem
GetWindowLongA
PostMessageA
GetWindowRect
SetFocus
GetAsyncKeyState
SetActiveWindow
GetActiveWindow
GetCapture
ShowWindow
SetWindowPos
MapDialogRect
SendDlgItemMessageA
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
gdi32
EnumFontFamiliesExA
GetBkColor
GetTextColor
GetRgnBox
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
GetMapMode
CreateBitmap
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
DeleteObject
CreateRectRgnIndirect
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
TextOutA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegQueryValueExA
comctl32
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CoTaskMemFree
CoUninitialize
CoInitialize
CLSIDFromProgID
CoCreateInstance
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocString
Sections
.text Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ