Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_4b5a34ef1292fbd7185560654c68c539_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-27_4b5a34ef1292fbd7185560654c68c539_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_4b5a34ef1292fbd7185560654c68c539_icedid
-
Size
680KB
-
MD5
4b5a34ef1292fbd7185560654c68c539
-
SHA1
6aeec989e65fb56299e9537474418bac9baec242
-
SHA256
99bed37c1c10435d546fc17d26d422d391d93f6f8bf0f69e807ec9ae6fe44d8d
-
SHA512
759817edb5670d778032205b74fe487099557c0864bd7bff3fd5316d2151bac3598950f61f2a0999a4a5c36fca15bf54ba48f72ccb67a567fb7aa04c927e46da
-
SSDEEP
12288:2Y/uFMY+argMZ90WbCFK/cOr++batQDm2d5JyOd7G8:dJYPr9tbCk/lPb7D3d5wOdz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-27_4b5a34ef1292fbd7185560654c68c539_icedid
Files
-
2024-01-27_4b5a34ef1292fbd7185560654c68c539_icedid.exe windows:4 windows x86 arch:x86
1844f1f7a56c3a795ef059aece280716
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetTickCount
SetErrorMode
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetCurrentDirectoryA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
InterlockedIncrement
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
RaiseException
InterlockedDecrement
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
GetModuleHandleA
GetProcAddress
SetLastError
MulDiv
FormatMessageA
lstrcpynA
FreeResource
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
MultiByteToWideChar
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
GetSystemDefaultLCID
CreateThread
SetThreadPriority
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CreateFileA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
WriteFile
ReadFile
SetFilePointer
GetFileSize
GetLastError
OpenFile
_lclose
GlobalReAlloc
_llseek
LocalAlloc
LocalFree
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
_lread
GetCurrentProcess
CloseHandle
RemoveDirectoryA
GetComputerNameA
GetModuleFileNameA
Sleep
DeleteFileA
WinExec
SetFileAttributesA
CopyFileA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
SetCurrentDirectoryA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
GetLocalTime
GetLogicalDriveStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
CreateDirectoryA
GetVersion
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetFileType
InterlockedExchange
user32
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextA
TabbedTextOutA
GetWindowTextLengthA
GetWindowTextA
GetFocus
RegisterWindowMessageA
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
CheckRadioButton
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
CharUpperA
DestroyIcon
ReleaseDC
ExitWindowsEx
GetSystemMetrics
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
ModifyMenuA
SetMenuItemBitmaps
LoadIconA
KillTimer
SetTimer
GetDC
GetClientRect
IsIconic
DrawIcon
PostQuitMessage
MessageBoxA
GetParent
EnableWindow
SendMessageA
PostThreadMessageA
SetWindowPos
RegisterClipboardFormatA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
SetCapture
DestroyMenu
LoadCursorA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
DrawTextExA
wsprintfA
GetClassLongA
gdi32
SetTextColor
SetMapMode
GetClipBox
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ExtSelectClipRgn
CreatePen
CreateSolidBrush
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
RestoreDC
SaveDC
Rectangle
PatBlt
SetDIBitsToDevice
GetStockObject
CreatePalette
SetBkMode
SetBkColor
CreateBitmap
DeleteObject
SelectPalette
RealizePalette
SelectObject
DeleteDC
AddFontResourceA
GetDeviceCaps
CreateICA
ScaleWindowExtEx
CreateFontIndirectA
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegSetValueExA
RegCreateKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
GetUserNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegEnumKeyA
RegDeleteValueA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
ShellExecuteA
SHGetMalloc
SHGetFileInfoA
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoTaskMemAlloc
StgOpenStorageOnILockBytes
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
oleaut32
VariantClear
VariantInit
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocString
OleCreateFontIndirect
VariantChangeType
Sections
.text Size: 336KB - Virtual size: 335KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ