Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_67b44e40899ca86a06de61635f6000e6_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-23_67b44e40899ca86a06de61635f6000e6_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-23_67b44e40899ca86a06de61635f6000e6_icedid
-
Size
200KB
-
MD5
67b44e40899ca86a06de61635f6000e6
-
SHA1
f4cec6776e5b7a4745f10ecbbb5ddb40b5d689ca
-
SHA256
dd23deeefa6c264166f9bb59c3ba6c7956994b996b6067bfca3f5e1796d7cbf7
-
SHA512
0ea22112c0dab3fe9f39c564a8dc70b3854ab47a1425783eb2b3ba56e6c9f69ad5fa7f6db0d019b7d8f207826930a8512584d06751efac4b64e939c8bfc2bc14
-
SSDEEP
3072:SM6HnRSuspdfFOzqiQJHwZTNwb4PrtSI8k/i1s6s8blm7vAyKD:FNuspdfcz2JQVNrPrt3/i1ovA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-23_67b44e40899ca86a06de61635f6000e6_icedid
Files
-
2024-01-23_67b44e40899ca86a06de61635f6000e6_icedid.exe windows:4 windows x86 arch:x86
1c9bedcb7b8e0f1361894ac6bed30a0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
StrToIntA
kernel32
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
ExitThread
CreateThread
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetDriveTypeA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
HeapFree
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
Sleep
TerminateProcess
OpenProcess
CloseHandle
GetCurrentProcess
GetVersion
WinExec
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
GetLastError
lstrcmpiA
lstrlenA
CompareStringA
CompareStringW
FreeResource
GlobalFree
GlobalUnlock
GlobalLock
GetModuleHandleA
lstrcpynA
lstrcmpW
lstrcatA
GlobalDeleteAtom
HeapAlloc
RtlUnwind
SetErrorMode
GetCurrentDirectoryA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
LocalFree
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetFileTime
GetFileAttributesA
SetFileAttributesA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
InterlockedDecrement
CreateEventA
FormatMessageA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
SetLastError
MulDiv
GlobalAlloc
user32
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
wsprintfA
ReleaseDC
GetDC
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ShowWindow
SetWindowTextA
IsDialogMessageA
GetMenuState
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
EnableWindow
SendMessageA
DrawIcon
GetMenu
IsIconic
GetClientRect
LoadIconA
GetSystemMetrics
AdjustWindowRectEx
IsMenu
CharUpperA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
IsWindow
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
GetActiveWindow
GetDesktopWindow
GetWindow
PtInRect
CopyRect
GetWindowRect
GetWindowPlacement
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
gdi32
DeleteObject
PtVisible
RectVisible
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
CreateBitmap
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegEnumValueA
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
RegDeleteKeyA
AdjustTokenPrivileges
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
comctl32
ImageList_ReplaceIcon
ord17
ImageList_Destroy
ImageList_Create
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 128KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ