Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_0f0e4ab1f4840319553faead1918c031_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_0f0e4ab1f4840319553faead1918c031_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_0f0e4ab1f4840319553faead1918c031_icedid
-
Size
516KB
-
MD5
0f0e4ab1f4840319553faead1918c031
-
SHA1
04170c10d38188599e4e75b12447d2ce13b65bd1
-
SHA256
5b4355e0bfa4597d14fa2003a63b08503051220c3c97229db55c38cc1789c4ac
-
SHA512
3c7aab13f6fb9463b78b67d11c08858e8fdcd59ebef512a0e405271488f43b47ce3e4f584aa0319f1707d53e48c832aa2bfc509ba917e8cd3952f7a11c41a420
-
SSDEEP
6144:P23p3fi6dUw7Zc/OpQiNP9BmjJdD1Vur8z4/VMLUPe92AOZVjbypr:PGp9ZcmNP94Vuoz4kUP62rVQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-13_0f0e4ab1f4840319553faead1918c031_icedid
Files
-
2024-02-13_0f0e4ab1f4840319553faead1918c031_icedid.exe windows:5 windows x86 arch:x86
98e82bdb003922ba07f4b3f360c1ae7c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
SetErrorMode
GetFileAttributesA
GetFileSizeEx
GetFileTime
WritePrivateProfileStringA
GetCurrentDirectoryA
GetTickCount
RtlUnwind
GetCommandLineA
GetStartupInfoA
HeapAlloc
RaiseException
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
SetStdHandle
GetFileType
Sleep
ExitProcess
HeapSize
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedIncrement
GetModuleHandleW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
WaitForSingleObject
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
ReleaseMutex
CreateMutexA
GetCurrentProcessId
VirtualProtect
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
FreeLibrary
GetModuleFileNameW
GlobalFree
FormatMessageA
LocalFree
MulDiv
GetProcessHeap
HeapFree
MultiByteToWideChar
InterlockedDecrement
lstrcpyA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
RemoveDirectoryA
GetTempPathA
GetEnvironmentVariableA
GetModuleFileNameA
GetLogicalDrives
GetDriveTypeA
InterlockedExchange
DeleteFileA
CreateDirectoryA
CopyFileA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
lstrlenA
GlobalAlloc
GlobalLock
GlobalSize
GlobalUnlock
UnhandledExceptionFilter
user32
RegisterClipboardFormatA
PostThreadMessageA
LoadCursorA
GetSysColorBrush
SetWindowContextHelpId
SetCursor
PostQuitMessage
GetMessageA
TranslateMessage
ValidateRect
CharUpperA
DrawFocusRect
GetWindowThreadProcessId
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
WindowFromPoint
GetActiveWindow
MapDialogRect
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
PostMessageA
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
FillRect
UnhookWindowsHookEx
ReleaseCapture
SetCapture
GetClassLongA
UnregisterClassA
EmptyClipboard
EnableWindow
SendMessageA
PeekMessageA
IsWindow
LoadIconA
GetSysColor
InflateRect
DrawIcon
AppendMenuA
GetSystemMenu
IsIconic
GetWindowRect
GetClientRect
GetSystemMetrics
InvalidateRect
ClientToScreen
ScreenToClient
GetCursorPos
DestroyMenu
TrackPopupMenu
CreatePopupMenu
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
SetFocus
GetWindowLongA
GetWindow
GetParent
GetWindowTextA
GetWindowTextLengthA
SendDlgItemMessageA
gdi32
ExtSelectClipRgn
CreateBitmap
GetStockObject
CreateSolidBrush
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetDeviceCaps
SelectObject
DeleteDC
GetTextMetricsA
CreateCompatibleDC
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
Escape
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyExA
shell32
SHGetFileInfoA
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
comctl32
ord17
shlwapi
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
OleIsCurrentClipboard
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
OleFlushClipboard
CoRegisterMessageFilter
CoRevokeClassObject
CLSIDFromProgID
oleaut32
SysAllocString
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
VariantClear
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysFreeString
Sections
.text Size: 327KB - Virtual size: 327KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ