Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_0172a37db063f999ebadbe738f7d0ee8_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_0172a37db063f999ebadbe738f7d0ee8_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-02_0172a37db063f999ebadbe738f7d0ee8_icedid
-
Size
332KB
-
MD5
0172a37db063f999ebadbe738f7d0ee8
-
SHA1
46a5db4667bd21b6f60bdc0311869b139f720d98
-
SHA256
f9121f7287a197cd36e22a0b40e63a0f394baebf5e090b70de26b55bccb83980
-
SHA512
97eb56d63337bddf438d35f50a29b469ec16baeadb3eebd7618d1771279dac79c24a6457828325036bab0ab3f5473af497fe50d2296ae5acb9bc366bf60cdcc5
-
SSDEEP
6144:TygTroYgSbxXT8mup7klZtoJMfJH2OtAOcOiXC8g:VqpwZD5btCDS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-02_0172a37db063f999ebadbe738f7d0ee8_icedid
Files
-
2024-02-02_0172a37db063f999ebadbe738f7d0ee8_icedid.exe windows:4 windows x86 arch:x86
13008ffbc16564be186bf2ae3d6be0a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
SetEndOfFile
GetCurrentProcess
GetFullPathNameA
GetCPInfo
GetOEMCP
SetErrorMode
HeapAlloc
RtlUnwind
GetDriveTypeA
GetSystemTimeAsFileTime
HeapFree
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitThread
CreateThread
ExitProcess
HeapSize
HeapCreate
VirtualFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
DeleteFileA
GlobalFlags
GetCurrentDirectoryA
WritePrivateProfileStringA
GetThreadLocale
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
FreeResource
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
lstrcmpA
FreeLibrary
SuspendThread
GetCurrentThreadId
ResumeThread
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
GetCurrentProcessId
GetModuleFileNameA
lstrlenA
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
GetLastError
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
InitializeCriticalSection
CreateEventA
SetupComm
GetCommState
SetCommState
CreateFileA
SetThreadPriority
TerminateThread
DeleteCriticalSection
PurgeComm
CloseHandle
WaitForSingleObject
WaitForMultipleObjects
Sleep
ResetEvent
EnterCriticalSection
LeaveCriticalSection
SetEvent
GetCommTimeouts
SetCommTimeouts
ReadFile
WriteFile
GetOverlappedResult
HeapDestroy
user32
UnregisterClassA
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
LoadCursorA
GetSysColorBrush
EndPaint
GetMessageTime
BeginPaint
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
PostMessageA
UpdateWindow
GetSystemMetrics
LoadIconA
EnableWindow
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetViewportOrgEx
DeleteObject
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
shlwapi
PathFindExtensionA
PathFindFileNameA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 216KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 311KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ