Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_bc26c2f1ee1dd893daded7ab36d63b69_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_bc26c2f1ee1dd893daded7ab36d63b69_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_bc26c2f1ee1dd893daded7ab36d63b69_icedid
-
Size
864KB
-
MD5
bc26c2f1ee1dd893daded7ab36d63b69
-
SHA1
bbf3f54f3ad1b0dc22aaa13df85aba3b9b0febe8
-
SHA256
3f871697f22f16f7db82c43d3095c035a9f970cf6493f3e93e6ef80c5b80fb89
-
SHA512
e3b14f06580b04746eabf05c0839e4456759c5abb721f9fc1797c1f332641d98a274aface6e77ae97b5a168fa5271559ac8b1057f3f6715a6aaa3d51c365d95a
-
SSDEEP
12288:hqMaHXbvI9B1q0++j+t2kgDdogSgzltbJwlodnWIbwYENGP:hqMaHXbvIfg02t2kgDegbtbGWjMNQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-14_bc26c2f1ee1dd893daded7ab36d63b69_icedid
Files
-
2024-02-14_bc26c2f1ee1dd893daded7ab36d63b69_icedid.exe windows:4 windows x86 arch:x86
08ffd7ac6e41f72ea2ac9fb092dfa79d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
RemoveDirectoryA
GetSystemTimeAsFileTime
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapReAlloc
RtlUnwind
ExitThread
CreateThread
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetTimeZoneInformation
VirtualQuery
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
GetCurrentProcessId
SetUnhandledExceptionFilter
SetStdHandle
SetEnvironmentVariableA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapAlloc
HeapFree
SetErrorMode
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GlobalFlags
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
CreateEventA
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
InterlockedDecrement
RaiseException
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
GetModuleHandleA
GetProcAddress
MulDiv
FormatMessageA
LocalFree
FreeResource
SetLastError
lstrcpynA
CloseHandle
CreateFileMappingA
GlobalFree
ReadFile
WriteFile
GlobalSize
UnmapViewOfFile
MapViewOfFile
SetFilePointer
GetFileSize
CreateFileA
GlobalUnlock
GlobalAlloc
GlobalLock
QueryPerformanceFrequency
GetTickCount
QueryPerformanceCounter
SuspendThread
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
FindNextFileA
GetModuleFileNameA
FindClose
CopyFileA
FindFirstFileA
GetVersion
GetVersionExA
CompareStringA
LockResource
GetThreadLocale
lstrcmpiA
GetLastError
InterlockedExchange
MultiByteToWideChar
GetACP
CompareStringW
SizeofResource
WideCharToMultiByte
LoadResource
GetLocaleInfoA
lstrlenA
FindResourceA
SetHandleCount
user32
UnpackDDElParam
DestroyMenu
LoadMenuA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
ValidateRect
GetCursorPos
GetMessageA
PostQuitMessage
ShowOwnedPopups
InflateRect
GetMenuItemInfoA
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsChild
GetForegroundWindow
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
ReuseDDElParam
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
BringWindowToTop
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
wsprintfA
GetWindowTextLengthA
GetWindowTextA
GetWindow
GetWindowLongA
ReleaseCapture
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
GetMessageTime
SetRectEmpty
EnableWindow
SendMessageA
PostMessageA
GetSysColorBrush
SetFocus
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
GetSystemMenu
IsIconic
LoadIconA
DrawIcon
TranslateMessage
PeekMessageA
AppendMenuA
DispatchMessageA
GetSystemMetrics
SetCursor
SetMenu
TranslateAcceleratorA
ReleaseDC
GetDC
ShowWindow
GetMenu
GetParent
LoadCursorA
MessageBoxA
FillRect
LoadBitmapA
GetClientRect
InvalidateRect
GetKeyState
gdi32
BitBlt
GetPixel
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreatePatternBrush
GetStockObject
SelectPalette
CreateSolidBrush
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateCompatibleBitmap
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SetDIBitsToDevice
GetDeviceCaps
CreatePalette
RealizePalette
GetTextExtentPoint32A
CreateFontIndirectA
GetObjectA
CreateDIBSection
DeleteObject
SelectObject
CreateCompatibleDC
SetStretchBltMode
StretchDIBits
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
DragQueryFileA
DragFinish
SHGetPathFromIDListA
SHGetMalloc
SHBrowseForFolderA
SHGetDesktopFolder
ShellExecuteA
comctl32
ImageList_Replace
ImageList_SetImageCount
_TrackMouseEvent
ord17
ImageList_Destroy
ImageList_Create
ImageList_Draw
ImageList_GetImageInfo
shlwapi
PathFindExtensionA
PathFindFileNameA
Sections
.text Size: 604KB - Virtual size: 601KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ