Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_09e3d3055e67b48154fd456900e2dbec_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_09e3d3055e67b48154fd456900e2dbec_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_09e3d3055e67b48154fd456900e2dbec_icedid
-
Size
248KB
-
MD5
09e3d3055e67b48154fd456900e2dbec
-
SHA1
d9196e9985cbfd6f6a2b0c80c305436a96d25464
-
SHA256
cb6eeb2fbf04c4b3dd2f3b57ad919489a6f027d52e0b69fbb42636acc9113e72
-
SHA512
2158664734f2ca39a913cb6ab146ff43ccd6904604b7f2ce76a8e5dd5eb17568c4d3212d940bd3c9e7d218f8c9e99da825a7f78c4176fdaf7f0ac370fc8a0e95
-
SSDEEP
6144:e6rwcaAggzv7zDwboeVIC6MpkZtZvSGeYZ2k7c+h:e6XaAggzzwblIC66knZLZ1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-11_09e3d3055e67b48154fd456900e2dbec_icedid
Files
-
2024-01-11_09e3d3055e67b48154fd456900e2dbec_icedid.exe windows:4 windows x86 arch:x86
99638bb373769a72568bbb87fa87be0c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalGetAtomNameA
WritePrivateProfileStringA
GlobalFlags
GetCPInfo
GetOEMCP
ExitProcess
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
TerminateProcess
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GlobalAddAtomA
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GlobalFindAtomA
GetFileTime
GetFileAttributesA
InterlockedExchange
FileTimeToLocalFileTime
InterlockedIncrement
FileTimeToSystemTime
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
LocalAlloc
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesA
SetErrorMode
lstrcatA
LoadLibraryA
GetProcAddress
GetModuleFileNameA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
lstrcpyA
lstrcpyW
lstrcmpW
SetLastError
GlobalFree
FormatMessageA
LocalFree
lstrcmpA
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalUnlock
lstrcpynA
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
GetLastError
GetCommandLineA
GetModuleHandleA
GetTempPathA
InterlockedDecrement
MultiByteToWideChar
DeleteCriticalSection
InitializeCriticalSection
RaiseException
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
user32
ShowWindow
SetWindowTextA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
DispatchMessageA
UnregisterClassA
MessageBoxA
CharUpperA
wsprintfA
EnableWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
DestroyMenu
GetKeyState
GetClassInfoExA
GetDesktopWindow
GetSubMenu
GetMenuItemCount
GetFocus
GetMenuItemID
GetMenuState
GetSystemMetrics
PostQuitMessage
PostMessageA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
SetForegroundWindow
IsWindowVisible
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
UnhookWindowsHookEx
LoadCursorA
GetSysColorBrush
GetWindowTextA
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
GetSysColor
ReleaseDC
GetDC
gdi32
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
comctl32
ord17
shlwapi
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
ole32
CoInitialize
CoCreateInstance
OleRun
oleaut32
SysAllocString
VariantChangeType
VariantClear
VariantInit
SysFreeString
SysStringByteLen
SysAllocStringByteLen
GetErrorInfo
odbc32
ord17
ord72
ord4
ord41
ord10
ord2
ord1
ord15
ord9
ord14
ord3
ord16
ord20
ord8
ord48
ord49
ord11
ord19
ord12
ord46
ord18
ord13
ord59
ord68
ord44
ord45
ord50
ord51
ord5
Sections
.text Size: 192KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ