Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_91c32d38699481418a5e6ad63f6363ce_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_91c32d38699481418a5e6ad63f6363ce_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-28_91c32d38699481418a5e6ad63f6363ce_icedid
-
Size
27.6MB
-
MD5
91c32d38699481418a5e6ad63f6363ce
-
SHA1
9eaf50c90730bc8d008c9d061fd7abe17e472e9d
-
SHA256
19b8c57227de4ede509e240decd46868c608d900c03d29b758b6e234ddeadfa9
-
SHA512
91621092a6194a5bf157edf59a7e133d52c0ca519061e2075774116495e633a512db0a2c062c819d4c821fb70dbf3d6a5696ee303a75540bcf9a5615afdb2106
-
SSDEEP
786432:G1eVUw+BNHRCX1nELnTRI1bn643Lha4ere6:GgVUwQT7RI1zRoDe6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-28_91c32d38699481418a5e6ad63f6363ce_icedid
Files
-
2024-01-28_91c32d38699481418a5e6ad63f6363ce_icedid.exe windows:4 windows x86 arch:x86
c768abe4d5991073341021751c6fb6ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
TerminateProcess
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
GetOEMCP
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetUnhandledExceptionFilter
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetCPInfo
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetModuleHandleA
lstrcatA
GetCurrentThreadId
GlobalFlags
GetFileTime
GetFileAttributesA
GetProcAddress
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WaitForSingleObject
lstrcpyA
FindFirstFileA
FindClose
lstrcmpA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
LocalAlloc
FreeLibrary
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
RaiseException
MultiByteToWideChar
OpenMutexA
CreateMutexA
ReleaseMutex
DeleteFileA
CreateThread
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetModuleFileNameA
CreateFileA
ReadFile
GetFileSize
WriteFile
CloseHandle
lstrlenA
VirtualFree
GetLastError
user32
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
CopyRect
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowPos
SetWindowLongA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetFocus
GetClassNameA
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
UnhookWindowsHookEx
DestroyMenu
PostQuitMessage
LoadCursorA
GetSystemMetrics
IsIconic
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnregisterClassA
CharUpperA
DialogBoxParamA
SetTimer
MessageBoxA
BeginPaint
EndPaint
SetWindowTextA
GetDlgItem
InvalidateRect
GetWindowTextA
EnableWindow
EndDialog
PostMessageA
gdi32
RectVisible
PtVisible
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
SetMapMode
RestoreDC
SaveDC
SetBkColor
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
SetBkMode
SetTextColor
ExtTextOutA
comdlg32
GetFileTitleA
GetSaveFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
CryptGetUserKey
CryptImportKey
CryptReleaseContext
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptDecrypt
CryptEncrypt
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDeriveKey
CryptAcquireContextA
CryptGenKey
CryptDestroyKey
shell32
ShellExecuteA
comctl32
ord17
shlwapi
UrlUnescapeA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
oleaut32
VariantInit
VariantChangeType
VariantClear
wininet
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryDataAvailable
Sections
.text Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ