Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_e5d10d7e6b730fe55bfb5969c5d86bde_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_e5d10d7e6b730fe55bfb5969c5d86bde_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-26_e5d10d7e6b730fe55bfb5969c5d86bde_icedid
-
Size
536KB
-
MD5
e5d10d7e6b730fe55bfb5969c5d86bde
-
SHA1
75ab67995987968115a5475e74f02046eea3231d
-
SHA256
f7319e7ebd5757c715d6889a121f12d60fe0288510771b3bfa0e9ea41701ad25
-
SHA512
54f43370c3b82744087ae3020ba337e02dd31f3fce7203d1fc684a13941b1af58449dc65ab1bff33c337ce2520d8a1137c1ec19e0666a11ac853039c7d1884fd
-
SSDEEP
12288:4R4v1AmSJZvG4QgUEXZ/BzI5YpJqe3MW42FYJxe4:1AfA4QTEXZZMujqpW4Cgx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-26_e5d10d7e6b730fe55bfb5969c5d86bde_icedid
Files
-
2024-01-26_e5d10d7e6b730fe55bfb5969c5d86bde_icedid.exe windows:4 windows x86 arch:x86
c16222a4a1fd35910b9c96b533636c71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_ntoa
gethostbyname
gethostname
WSAStartup
kernel32
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
IsBadCodePtr
GetLocaleInfoW
SetEnvironmentVariableA
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
SetEvent
ResetEvent
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SystemTimeToFileTime
HeapSize
GetFileType
SetStdHandle
CreateThread
ExitThread
HeapReAlloc
TerminateProcess
ExitProcess
GetCommandLineA
GetStartupInfoA
VirtualQuery
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
IsBadReadPtr
RtlUnwind
SetErrorMode
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GetFileTime
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
LocalAlloc
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
FreeResource
GetModuleHandleA
SuspendThread
GetCurrentThreadId
ResumeThread
SetThreadPriority
FileTimeToSystemTime
WaitForSingleObject
DeleteFileA
GetComputerNameA
FindNextFileA
CloseHandle
ReadFile
CreateFileA
FindClose
FindFirstFileA
GetLastError
GetWindowsDirectoryA
GetSystemDirectoryA
InterlockedDecrement
Sleep
InterlockedIncrement
GetLocalTime
SleepEx
PulseEvent
CreateEventA
GlobalUnlock
GlobalLock
lstrcmpA
SetLastError
MulDiv
FormatMessageA
lstrcpynA
RaiseException
GetSystemInfo
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
FileTimeToLocalFileTime
GetTimeZoneInformation
LocalFree
GetCurrentThread
GetProcAddress
GetTempFileNameA
GetTempPathA
GetCurrentProcess
SetProcessWorkingSetSize
CopyFileA
GetFileSize
GetTickCount
SetFilePointer
WriteFile
MultiByteToWideChar
CreateFileMappingA
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
FindResourceExA
GetUserDefaultLangID
LoadLibraryA
GetSystemDefaultLangID
FreeLibrary
GlobalFree
GlobalAlloc
InterlockedExchange
user32
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
SetRect
IsRectEmpty
ReleaseCapture
SetCapture
CharNextA
LoadCursorA
GetSysColorBrush
DestroyMenu
SetWindowContextHelpId
MapDialogRect
SetCursor
PostQuitMessage
wsprintfA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
MessageBoxA
TrackPopupMenu
UpdateWindow
GetMenu
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
GetWindowPlacement
CopyRect
GetWindow
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
PeekMessageA
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
UnregisterClassA
DestroyIcon
RegisterClipboardFormatA
PostThreadMessageA
LoadImageA
GetCursorPos
LoadMenuA
GetSubMenu
CharUpperA
SetForegroundWindow
FindWindowA
IsWindow
GetSystemMetrics
LoadIconA
SetTimer
IsWindowVisible
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
SystemParametersInfoA
PostMessageA
InflateRect
EnableWindow
GetParent
InvalidateRect
GetWindowRect
PtInRect
gdi32
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetStockObject
CreateBitmap
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
GetClipBox
SetMapMode
CreatePalette
StretchDIBits
SetDIBitsToDevice
SetStretchBltMode
SelectPalette
RealizePalette
GetDeviceCaps
SaveDC
RestoreDC
SetBkColor
SetTextColor
comdlg32
GetFileTitleA
winspool.drv
AddJobA
EnumJobsA
OpenPrinterA
GetPrinterA
SetPrinterA
GetJobA
ScheduleJob
ClosePrinter
SetJobA
EnumPrintersA
DocumentPropertiesA
advapi32
OpenProcessToken
RegDeleteKeyA
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegEnumValueA
SetSecurityDescriptorSacl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
GetSidLengthRequired
LookupAccountNameA
GetUserNameA
GetTokenInformation
GetLengthSid
CopySid
SetSecurityDescriptorOwner
shell32
Shell_NotifyIconA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromProgID
CoInitializeEx
CoCreateGuid
CLSIDFromString
StringFromGUID2
CoTaskMemFree
CoTaskMemAlloc
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
oleaut32
VariantClear
SafeArrayDestroy
VariantCopy
SysAllocStringLen
SysAllocStringByteLen
SysStringLen
SystemTimeToVariantTime
VariantChangeType
VariantInit
SysFreeString
SysAllocString
OleCreateFontIndirect
wininet
HttpSendRequestA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
InternetQueryDataAvailable
HttpSendRequestExA
InternetConnectA
HttpOpenRequestA
InternetOpenA
HttpEndRequestA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 372KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ