Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_e0bf9a33d21fa2d8212a2215a74ddadc_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-24_e0bf9a33d21fa2d8212a2215a74ddadc_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_e0bf9a33d21fa2d8212a2215a74ddadc_icedid
-
Size
4.9MB
-
MD5
e0bf9a33d21fa2d8212a2215a74ddadc
-
SHA1
e46d15b9bded9a8b5839471d745e31ba8a001df6
-
SHA256
cd69462e86477ff02b02e85c4a736cca77dd551afc5512da65654c3998bf7a5d
-
SHA512
e123e1836d2a5ff2fa12318bbc3bae7548ff41894a2ba88e140b79b3b85877c48167a593f71bfbc806f37e00da48fc386b06ccb16d6885d638f867733de6730b
-
SSDEEP
98304:TTPnhtIti1AXws+8OMrYlNR0qK3ljo+5EYDHEDdZ9XJS:TTPhgnwYak3ljo+5EG6dZVJS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-24_e0bf9a33d21fa2d8212a2215a74ddadc_icedid
Files
-
2024-01-24_e0bf9a33d21fa2d8212a2215a74ddadc_icedid.exe windows:4 windows x86 arch:x86
4e0439b9760aecdb683a29ec652e4b12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemInfo
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
TerminateProcess
ExitProcess
GetDriveTypeA
SetCurrentDirectoryA
SetEnvironmentVariableA
FindNextFileA
CreateDirectoryA
RtlUnwind
GetOEMCP
GetCPInfo
SetErrorMode
GlobalFlags
GetCurrentDirectoryA
WritePrivateProfileStringA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetFileTime
GetFileAttributesA
SetFileAttributesA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedDecrement
FreeResource
CloseHandle
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
LocalFree
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
MultiByteToWideChar
GetComputerNameA
GetLastError
GetModuleFileNameA
Sleep
FormatMessageA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetHandleCount
user32
DestroyMenu
LoadCursorA
GetSysColorBrush
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowRect
PtInRect
GetWindow
wsprintfA
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
MessageBoxA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
PostQuitMessage
GetWindowPlacement
PostMessageA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CharUpperA
EnableWindow
GetSystemMetrics
LoadIconA
GetClientRect
IsIconic
SendMessageA
DrawIcon
CopyRect
gdi32
RectVisible
PtVisible
DeleteObject
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
GetDeviceCaps
GetObjectA
CreateFontIndirectA
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
TextOutA
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegEnumValueA
RegCloseKey
RegEnumKeyA
RegOpenKeyExA
RegDeleteValueA
RegFlushKey
RegGetKeySecurity
RegLoadKeyA
RegNotifyChangeKeyValue
RegQueryValueExA
RegReplaceKeyA
RegQueryValueA
RegOpenKeyA
RegQueryInfoKeyA
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegConnectRegistryA
RegUnLoadKeyA
RegSetValueExA
RegSetKeySecurity
RegSaveKeyA
RegRestoreKeyA
shell32
SHGetSpecialFolderPathA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ