Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_dd575ae49ac1b2a75cad972a57addb8d_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-11_dd575ae49ac1b2a75cad972a57addb8d_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_dd575ae49ac1b2a75cad972a57addb8d_icedid
-
Size
444KB
-
MD5
dd575ae49ac1b2a75cad972a57addb8d
-
SHA1
05ce858b835adfa1ab69979c5c4a91e42dbf4cd4
-
SHA256
43c1bc8760312afcbab28d705d1d364bc3f41bc120bf7c627968510a62e89c0e
-
SHA512
fc57435611970cd72550f04dfd75f3af836252a0677b70ea6553f4755ce49e45f9b253f2884884f4f76013aa690a94ef25b686ed008dd629d75348a7dce9080d
-
SSDEEP
12288:8X88YtKuTf0QkNt0W4aqwKWv+kNk2LJx9Rfy:lNtR/kj0laqllkNkcx95y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-11_dd575ae49ac1b2a75cad972a57addb8d_icedid
Files
-
2024-01-11_dd575ae49ac1b2a75cad972a57addb8d_icedid.exe windows:4 windows x86 arch:x86
9396de2fdf8313c4866f9904a7b44431
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetFileTime
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
SetErrorMode
HeapAlloc
HeapFree
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
GetStartupInfoA
HeapReAlloc
ExitThread
CreateThread
SetStdHandle
GetFileType
HeapSize
UnlockFile
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
LockFile
HeapDestroy
DuplicateHandle
LocalReAlloc
GlobalHandle
GlobalReAlloc
SuspendThread
ResumeThread
SetThreadPriority
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetProfileIntA
GetTickCount
VirtualProtect
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
FreeResource
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
FileTimeToLocalFileTime
GlobalFree
CopyFileA
MulDiv
GlobalSize
GlobalAlloc
lstrcpynA
VerSetConditionMask
VerifyVersionInfoA
CreateProcessA
GetSystemDirectoryA
ExpandEnvironmentStringsA
GetVolumeInformationA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
TerminateProcess
OpenProcess
FindResourceExA
GetProcAddress
GetModuleHandleA
LoadLibraryExA
FindNextFileA
FindFirstFileA
SetEvent
CreateEventA
ReleaseMutex
CreateMutexA
SetEndOfFile
FlushFileBuffers
GetFileSize
SetFilePointer
ReadFile
WriteFile
CreateFileA
GetSystemTime
Sleep
OutputDebugStringA
GetStdHandle
GetComputerNameExA
GetCurrentDirectoryA
FindClose
ProcessIdToSessionId
CreateDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetUserDefaultUILanguage
GetFullPathNameA
GetCommandLineA
GetModuleFileNameA
LocalFree
TlsFree
GetCurrentThreadId
TlsAlloc
TlsSetValue
GlobalLock
GlobalUnlock
InterlockedDecrement
FormatMessageA
LocalAlloc
TlsGetValue
InterlockedIncrement
FreeLibrary
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetPrivateProfileStringA
MoveFileExA
CloseHandle
CompareStringW
CompareStringA
WaitForSingleObject
SetLastError
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
InvalidateRect
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
SetCursor
PostQuitMessage
IsClipboardFormatAvailable
DestroyMenu
InflateRect
MapDialogRect
GetAsyncKeyState
WindowFromPoint
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
ReleaseCapture
CharUpperA
EnableWindow
GetDlgCtrlID
wsprintfA
GetSubMenu
LoadMenuA
SendMessageA
PostMessageA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
IsWindowVisible
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SetCapture
IsRectEmpty
SetRect
CopyAcceleratorTableA
InvalidateRgn
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
UnhookWindowsHookEx
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
TrackPopupMenu
GetCursorPos
RegisterClipboardFormatA
EnumWindows
MessageBoxIndirectA
MessageBoxA
GetWindowThreadProcessId
GetClassNameA
SetForegroundWindow
DrawIcon
AppendMenuA
GetSystemMenu
IsIconic
GetClientRect
ClientToScreen
ScreenToClient
LoadIconA
GetSystemMetrics
PostThreadMessageA
CharNextA
CharPrevA
GetMenuItemCount
GetMenuItemID
GetMenuState
GetDesktopWindow
EndDialog
GetNextDlgTabItem
GetParent
GetWindowDC
gdi32
GetRgnBox
GetTextColor
GetBkColor
GetMapMode
EnumFontFamiliesExA
CreateRectRgnIndirect
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
Escape
OffsetViewportOrgEx
SetViewportOrgEx
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetDeviceCaps
CopyMetaFileA
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
SelectObject
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
CryptReleaseContext
OpenEventLogA
CryptDestroyKey
CryptDestroyHash
GetLengthSid
CopySid
CloseEventLog
EqualSid
RegCloseKey
GetOldestEventLogRecord
ReadEventLogA
ReportEventA
OpenProcessToken
LookupPrivilegeValueA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
LookupAccountSidA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
CryptDeriveKey
CryptCreateHash
CryptAcquireContextA
CryptDecrypt
CryptGetHashParam
CryptHashData
GetTokenInformation
AdjustTokenPrivileges
shell32
CommandLineToArgvW
SHGetFolderPathA
SHGetPathFromIDListA
SHBrowseForFolderA
comctl32
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
ord17
shlwapi
PathAppendA
PathAddExtensionA
PathFindFileNameA
PathRemoveExtensionA
PathFileExistsA
PathFindExtensionA
UrlUnescapeA
PathIsUNCA
PathStripToRootA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
InternetConnectA
HttpOpenRequestA
HttpQueryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetSetOptionExA
InternetQueryDataAvailable
InternetCloseHandle
InternetGetLastResponseInfoA
InternetOpenA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
HttpSendRequestA
ole32
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
OleDuplicateData
ReleaseStgMedium
CoTaskMemAlloc
CoFreeUnusedLibraries
OleGetClipboard
CoInitialize
CoUninitialize
CoCreateInstance
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
OleInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
OleUninitialize
CreateILockBytesOnHGlobal
CoRevokeClassObject
oleaut32
SysAllocString
SysAllocStringByteLen
SysFreeString
VariantCopy
VariantInit
VariantClear
SysAllocStringLen
SysStringLen
VariantChangeType
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
GetErrorInfo
oledlg
ord8
imm32
ImmDisableIME
iphlpapi
GetIfEntry
GetAdaptersInfo
psapi
GetModuleFileNameExA
sfc
SfcIsFileProtected
Sections
.text Size: 308KB - Virtual size: 307KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ