Static task
static1
Behavioral task
behavioral1
Sample
2024-02-03_19f2c1c78018b17afe130ca305c145df_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-03_19f2c1c78018b17afe130ca305c145df_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-03_19f2c1c78018b17afe130ca305c145df_icedid
-
Size
1.8MB
-
MD5
19f2c1c78018b17afe130ca305c145df
-
SHA1
68b3a89d7165a3d7fa9810b405df95ede54de72a
-
SHA256
2dd57682e490199e6b73d892924744ec127ad71d05351369f46a655cd2c2a5e7
-
SHA512
dc4bfa7836b49049e55c506d1ba7e25aee76a0468622169b4503ab1e8733cffd28fb1319c489baa880297d6a2ff0f2d91ac98f7c0d1fefb708985a1c3b177838
-
SSDEEP
24576:/xCduzlR0TuK454EKMbZTZQAdXRcKkhwX2CjS+W87eEq07mjPI2jwxAK/8tBfBB:/ISRM+jBZTqiOs+Ke50KMrAJB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-03_19f2c1c78018b17afe130ca305c145df_icedid
Files
-
2024-02-03_19f2c1c78018b17afe130ca305c145df_icedid.exe windows:4 windows x86 arch:x86
bedc3512aeadcac070bc47e2362de485
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_addr
htons
WSAGetLastError
inet_ntoa
closesocket
ntohs
htonl
WSASetLastError
getsockopt
recv
socket
gethostbyname
gethostname
select
ntohl
ioctlsocket
connect
WSACancelAsyncRequest
WSAAsyncGetHostByAddr
shutdown
accept
listen
WSAAsyncSelect
getsockname
getpeername
send
sendto
recvfrom
gethostbyaddr
setsockopt
bind
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
advapi32
RegisterEventSourceA
ReportEventA
RegisterServiceCtrlHandlerA
SetServiceStatus
ControlService
RegCreateKeyA
DeleteService
InitializeSecurityDescriptor
StartServiceCtrlDispatcherA
CreateServiceA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegSetValueA
RegSetValueExA
GetUserNameA
RegQueryInfoKeyA
QueryServiceConfigA
RegDeleteValueA
QueryServiceStatus
OpenSCManagerA
ChangeServiceConfigA
CloseServiceHandle
StartServiceA
OpenServiceA
RegQueryValueExA
LogonUserA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
RegEnumValueA
CreateProcessAsUserA
kernel32
FindResourceA
LoadResource
InterlockedExchange
GetFileSize
LockResource
GetModuleFileNameA
GetCurrentThreadId
DeleteFileA
LocalFree
LocalAlloc
IsBadWritePtr
GetTempFileNameA
GetSystemInfo
OutputDebugStringA
DefineDosDeviceA
GetTempPathA
DeviceIoControl
GetLocaleInfoA
GetUserDefaultLangID
GetCommandLineA
FileTimeToSystemTime
GetTimeZoneInformation
GetThreadLocale
SetThreadPriority
FormatMessageA
GetWindowsDirectoryA
WinExec
CreateThread
SetCurrentDirectoryA
OpenMutexA
GetComputerNameA
GetModuleHandleA
CopyFileA
GlobalMemoryStatus
GetSystemDirectoryA
QueryPerformanceCounter
CreateDirectoryA
MoveFileA
RemoveDirectoryA
SetLastError
FlushConsoleInputBuffer
GetStdHandle
ResumeThread
SuspendThread
WideCharToMultiByte
MultiByteToWideChar
IsBadReadPtr
lstrcpynA
FileTimeToLocalFileTime
GlobalUnlock
GlobalLock
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpiA
GlobalGetAtomNameA
GetVersion
GlobalFree
GlobalAlloc
DuplicateHandle
FlushFileBuffers
LockFile
lstrcatA
LeaveCriticalSection
GetVolumeInformationA
GetFullPathNameA
GetFileAttributesA
GetFileTime
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
MulDiv
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
WritePrivateProfileStringA
GetCurrentDirectoryA
RtlUnwind
RaiseException
ExitThread
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
SetEnvironmentVariableA
GetStartupInfoA
SetConsoleCtrlHandler
GetACP
SetStdHandle
GetFileType
HeapSize
UnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
SetHandleCount
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
IsBadCodePtr
CompareStringA
CompareStringW
GetVersionExA
GetCurrentProcess
InitializeCriticalSection
EnterCriticalSection
DeleteCriticalSection
WriteFile
SetUnhandledExceptionFilter
SetFilePointer
lstrcmpA
GetLocalTime
GetCurrentThread
OpenEventA
PeekNamedPipe
CreatePipe
LoadLibraryA
FreeLibrary
QueueUserAPC
OpenProcess
GetProcAddress
SleepEx
ResetEvent
GetExitCodeProcess
lstrcpyA
GetCurrentProcessId
TerminateThread
GetExitCodeThread
ReadFile
SetEvent
CreateProcessA
FindClose
FindNextFileA
FindFirstFileA
GetLastError
CreateFileA
GetFileInformationByHandle
GetTickCount
TerminateProcess
Sleep
InterlockedDecrement
GetSystemTime
SystemTimeToFileTime
CloseHandle
InterlockedIncrement
lstrlenA
ReleaseMutex
CreateMutexA
CreateEventA
SetConsoleMode
WaitForSingleObject
GetConsoleMode
UnlockFile
ReadConsoleInputA
SetEndOfFile
GetDiskFreeSpaceA
lstrlenW
user32
CopyRect
GetClientRect
AdjustWindowRectEx
SetActiveWindow
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
LoadIconA
SetFocus
IsDialogMessageA
MoveWindow
IsWindowEnabled
CharNextA
SetWindowContextHelpId
MapDialogRect
CharUpperA
DestroyMenu
PostQuitMessage
SetCursor
LoadCursorA
GetSysColorBrush
ReleaseDC
PtInRect
ClientToScreen
GetWindowDC
TabbedTextOutA
DrawTextA
GrayStringA
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
CreateDialogIndirectParamA
EndDialog
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetDlgItem
GetDC
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
SetWindowsHookExA
GetCursorPos
IsWindow
DestroyWindow
LoadStringA
GetThreadDesktop
SetThreadDesktop
SendMessageA
GetMenuItemCount
GetMenuState
GetMenuItemID
GetSubMenu
GetClassNameA
SetWindowTextA
MessageBoxA
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
GetUserObjectInformationA
CloseDesktop
CloseWindowStation
wsprintfA
EnableWindow
GetDesktopWindow
GetWindowTextA
FindWindowA
EnumWindows
PostMessageA
GetWindowThreadProcessId
KillTimer
SetTimer
ShowWindow
PeekMessageA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
PostThreadMessageA
MsgWaitForMultipleObjects
GetParent
UnregisterClassA
gdi32
SaveDC
RestoreDC
GetStockObject
SetBkColor
GetBkColor
GetTextColor
SetTextColor
GetClipBox
CreateCompatibleDC
CreateBitmap
CreateDCA
SelectObject
GetDeviceCaps
CreateCompatibleBitmap
GetBitmapBits
GetObjectA
BitBlt
SetViewportOrgEx
DeleteObject
OffsetViewportOrgEx
SetMapMode
GetViewportExtEx
GetWindowExtEx
RectVisible
TextOutA
PtVisible
Escape
DPtoLP
ExtTextOutA
GetMapMode
LPtoDP
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
DeleteDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comctl32
ord17
wsock32
WSAStartup
WSACleanup
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
CoInitialize
CoUninitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CoCreateFreeThreadedMarshaler
CoGetClassObject
CLSIDFromProgID
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
olepro32
ord253
oleaut32
SysAllocStringLen
SysReAllocString
SysReAllocStringLen
LoadTypeLi
SysFreeString
VariantClear
VariantCopy
SysAllocString
SysAllocStringByteLen
VariantChangeType
VarBstrFromCy
VarDateFromStr
VarBstrFromDate
VariantTimeToSystemTime
SysStringLen
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 284KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 184KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ