Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_32cf681478a91d37edd21c3c1ef1ea4d_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_32cf681478a91d37edd21c3c1ef1ea4d_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-04_32cf681478a91d37edd21c3c1ef1ea4d_icedid
-
Size
629KB
-
MD5
32cf681478a91d37edd21c3c1ef1ea4d
-
SHA1
83de08e3a64b1012b0dad8eeba22d057d9fe81b9
-
SHA256
4774f6a4725c67c5330b8278383a1b998258a1a93545a60f3364e3e92f85e08e
-
SHA512
b191eb09a1a027e566056b9dd40121f5fc33295c7e254ce6508e2e111b83b72d82b2dc0fb4d385d58552a35dccd1614771df4b778785ae391b11921c168b5bc0
-
SSDEEP
12288:k1+RyX/VWxgLxQJu1cWwhqrcI4J2C6XIyiPa8fFUIPi:k1pXdWaKJk3whqrcZJ+oPdFU9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-04_32cf681478a91d37edd21c3c1ef1ea4d_icedid
Files
-
2024-02-04_32cf681478a91d37edd21c3c1ef1ea4d_icedid.exe windows:5 windows x86 arch:x86
fd7a86789901adc88f8d8ebd8a7fb284
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dinput8
DirectInput8Create
kernel32
GetSystemTimeAsFileTime
RemoveDirectoryA
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RtlUnwind
VirtualAlloc
HeapReAlloc
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
GetTickCount
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceA
CreateFileA
WriteFile
CloseHandle
SetCurrentDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
DeleteFileA
SearchPathA
GetTempPathA
GetLongPathNameA
GetTempFileNameA
CreateDirectoryA
GetLastError
GetModuleHandleA
GetSystemInfo
GetModuleFileNameA
GetPrivateProfileStringA
QueryPerformanceFrequency
QueryPerformanceCounter
Sleep
GlobalUnlock
GlobalLock
GlobalAlloc
WritePrivateProfileStringA
LocalAlloc
LocalFree
InterlockedExchange
RaiseException
lstrlenA
MultiByteToWideChar
FormatMessageA
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
ReadFile
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalFlags
lstrcmpA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetCurrentProcessId
InterlockedDecrement
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
SetLastError
GlobalFree
user32
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ValidateRect
ClientToScreen
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowThreadProcessId
GetDC
ReleaseDC
GetSysColorBrush
IsWindowEnabled
RegisterWindowMessageA
WinHelpA
GetCapture
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetForegroundWindow
GetLastActivePopup
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
EnableWindow
SetForegroundWindow
PostMessageA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetParent
GetSysColor
GetClientRect
CopyRect
PtInRect
GetDlgCtrlID
SendMessageA
CallWindowProcA
GetMenu
GetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindow
SetWindowsHookExA
MessageBoxA
SetRect
GetCursorPos
ScreenToClient
DefWindowProcA
GetWindowRect
LoadImageA
SetWindowTextA
SetCursor
LoadCursorA
SetMenu
EnumDisplaySettingsA
DestroyWindow
LoadIconA
RegisterClassExA
CreateWindowExA
SetWindowLongA
LoadStringA
PeekMessageA
TranslateMessage
DispatchMessageA
GetAsyncKeyState
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetWindowTextA
ShowWindow
SetWindowPos
GetClassNameA
gdi32
SetMapMode
PtVisible
RectVisible
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
ExtTextOutA
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
DeleteObject
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
shell32
SHFileOperationA
ShellExecuteA
comctl32
InitCommonControlsEx
ord17
winmm
PlaySoundA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 485KB - Virtual size: 484KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ