Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_e2e36a49b311022526231250e992dfaa_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_e2e36a49b311022526231250e992dfaa_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_e2e36a49b311022526231250e992dfaa_icedid
-
Size
196KB
-
MD5
e2e36a49b311022526231250e992dfaa
-
SHA1
2a8e6e54f028a4bd3d47446d33bcceb92a13e976
-
SHA256
7668e5d498920973e3edc7151dfdec7ad78772081ee1ca6a9c90fdd8973440bb
-
SHA512
5ddbb89d11a5faaf2934e9ec0f98a5ab56f8fd733634d37f64ef0cf71381857cedd12125d73e2864fc8c396f3803c8dd9212639afb24ad288498badbcb4031b3
-
SSDEEP
3072:NRcAyioBXBU6kOY/XyL2TGOuI4VsSsCq/XfRDvFC0beI6lfO/EPg9D:bj+XBmOVrH+Ss5JDNDbeO/EP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-09_e2e36a49b311022526231250e992dfaa_icedid
Files
-
2024-01-09_e2e36a49b311022526231250e992dfaa_icedid.exe windows:4 windows x86 arch:x86
f256de3bfa04c1648cf08871337ef535
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiGetDeviceInstanceIdA
SetupDiOpenDevRegKey
SetupDiGetDeviceInstallParamsA
SetupDiEnumDeviceInfo
SetupDiRemoveDevice
SetupCopyOEMInfA
SetupDiGetDeviceRegistryPropertyA
SetupDiClassGuidsFromNameA
SetupDiGetClassDevsA
SetupDiCreateDeviceInfoA
SetupDiRegisterDeviceInfo
SetupDiSetDeviceInstallParamsA
SetupDiBuildDriverInfoList
SetupDiEnumDriverInfoW
SetupDiSetSelectedDriverW
SetupDiSelectDevice
SetupDiGetSelectedDriverW
SetupDiCallClassInstaller
SetupDiCreateDevRegKeyA
SetupDiInstallDriverFiles
SetupDiDestroyDeviceInfoList
kernel32
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
TerminateProcess
HeapSize
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetCurrentProcess
FlushFileBuffers
SetFilePointer
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GlobalFlags
lstrcatA
WritePrivateProfileStringA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CloseHandle
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
SetLastError
GlobalLock
GlobalUnlock
lstrcpynA
ReadFile
GetStdHandle
WriteFile
lstrcmpiA
GetVersion
MultiByteToWideChar
LocalAlloc
lstrlenA
GlobalAlloc
GlobalFree
GetLastError
FormatMessageA
LocalFree
ExitProcess
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetSystemInfo
user32
DestroyMenu
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
IsIconic
CopyRect
SetWindowPos
ShowWindow
SetWindowLongA
GetDlgItem
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindow
GetDlgCtrlID
SystemParametersInfoA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostMessageA
GetWindowRect
PtInRect
SetWindowTextA
GetClassNameA
wsprintfA
GetCapture
ClientToScreen
GetWindowTextA
UnhookWindowsHookEx
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
SetMenuItemBitmaps
GetFocus
ModifyMenuA
GetWindowPlacement
PostQuitMessage
SetCursor
SendMessageA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
MessageBoxA
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageA
TranslateMessage
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
gdi32
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegFlushKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegCloseKey
comctl32
ord17
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ