Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_ea7eede5acb200e59d21f6019c4c8d01_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-24_ea7eede5acb200e59d21f6019c4c8d01_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-24_ea7eede5acb200e59d21f6019c4c8d01_icedid
-
Size
489KB
-
MD5
ea7eede5acb200e59d21f6019c4c8d01
-
SHA1
b5d5a9045447e0e06a934649beb5bf67816ec1f8
-
SHA256
fe5f21fc922232672bfbcfd0a8a797bc28cfc60188b3ffd88de1052cf851448e
-
SHA512
212d0e623532387814575279d7a5f2364c695c5259648e9b91a103d46a93db7a6108fd44bdfb0c218e435198b97eb30116c1c0689bb4fea31621442597643d7b
-
SSDEEP
12288:07rRExERr12p5kG8EMJpCs8URJ/NwEskhodeY5izAIM:gryQeh8E88eLho8YWAz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-24_ea7eede5acb200e59d21f6019c4c8d01_icedid
Files
-
2024-01-24_ea7eede5acb200e59d21f6019c4c8d01_icedid.exe windows:5 windows x86 arch:x86
5d90ce0120787dfde30a4898f7ddbe5a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
SHDeleteKeyW
aclui
ord1
kernel32
GetFileAttributesW
GetFileSizeEx
GetFileTime
SetErrorMode
GetStartupInfoW
RtlUnwind
GetSystemTimeAsFileTime
ExitThread
CreateThread
ExitProcess
RaiseException
HeapAlloc
HeapFree
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
FileTimeToLocalFileTime
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetTimeFormatA
GetDateFormatA
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
LCMapStringA
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CreateFileA
CreateFileW
GetFullPathNameW
GetVolumeInformationW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
lstrlenA
ReleaseMutex
CreateMutexW
GetModuleHandleA
FileTimeToSystemTime
GlobalFindAtomW
GetVersionExW
CompareStringW
GetVersionExA
MulDiv
GetTickCount
WritePrivateProfileStringW
GlobalUnlock
GlobalFree
FreeResource
GetCurrentProcessId
SetLastError
GlobalAddAtomW
WaitForSingleObject
ResumeThread
CloseHandle
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryW
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
GetModuleHandleW
LoadLibraryA
GetProcAddress
ExpandEnvironmentStringsA
GetTimeZoneInformation
DeleteFileW
lstrlenW
WideCharToMultiByte
CreateDirectoryW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FindFirstFileW
FindNextFileW
MultiByteToWideChar
GetLastError
GetComputerNameExW
InterlockedDecrement
GetComputerNameW
GetVersion
CopyFileW
lstrcatW
LoadLibraryExW
FormatMessageW
LocalFree
FreeLibrary
lstrcpyW
Sleep
LoadResource
LockResource
SizeofResource
FindResourceW
GetModuleFileNameW
SetHandleCount
user32
UnregisterClassW
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableW
SetRect
IsRectEmpty
CharNextW
PostThreadMessageW
CharUpperW
GetSysColorBrush
ReleaseCapture
LoadCursorW
SetCapture
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
DestroyMenu
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
wsprintfW
EnableWindow
LoadIconW
SendMessageW
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
PtInRect
GetMenu
SetWindowLongW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetMenuItemID
GetMenuItemCount
GetSubMenu
CopyRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
RegisterClipboardFormatW
GetDesktopWindow
AppendMenuW
GetSystemMenu
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
PostMessageW
CreatePopupMenu
InvalidateRect
IsWindow
GetWindowRect
ReleaseDC
GetDC
MessageBoxW
PostQuitMessage
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuW
GetParent
GetFocus
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
ValidateRect
GetCursorPos
PeekMessageW
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageW
TranslateMessage
GetMessageW
CallNextHookEx
SetWindowsHookExW
SetCursor
IsWindowEnabled
GetLastActivePopup
GetWindowLongW
GetWindowThreadProcessId
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetFocus
gdi32
GetMapMode
GetRgnBox
GetTextColor
GetBkColor
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
CreateFontIndirectW
GetObjectW
SetViewportOrgEx
Escape
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutW
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateRectRgnIndirect
CreateBitmap
SelectObject
GetTextMetricsW
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegCloseKey
RegEnumKeyW
RegQueryValueW
RegDeleteKeyW
RegOpenKeyExA
RegQueryValueExA
GetUserNameW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteExW
comctl32
PropertySheetW
oledlg
OleUIBusyW
ole32
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoGetClassObject
CoTaskMemAlloc
CreateILockBytesOnHGlobal
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoCreateGuid
StringFromGUID2
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitializeSecurity
oleaut32
SysAllocString
VariantClear
VariantInit
SysFreeString
SysAllocStringByteLen
SysStringByteLen
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocStringLen
SysStringLen
VariantChangeType
OleCreateFontIndirect
SafeArrayDestroy
VariantCopy
Sections
.text Size: 363KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ