Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_aa979faa19d139317905b0e880c83900_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_aa979faa19d139317905b0e880c83900_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_aa979faa19d139317905b0e880c83900_icedid
-
Size
296KB
-
MD5
aa979faa19d139317905b0e880c83900
-
SHA1
04aacd4259dbb6ed409454ed92a5491fcb57ec9d
-
SHA256
a4ddfb12c11164c84ac501cd1c7c85c5e25770fc15ae4183991b2ed1a49fc0ff
-
SHA512
0bf3fe30e8e3a6e984e2702ef2f538cd433a6ab1b2f9251c9483996269326a59908dffa23933015bc7c86c8697d7bfad7d9d029eda5b987bc61503ef88fe28b9
-
SSDEEP
3072:pjrWcoK3kiPkFt33n0BUSXAbayhe6wYc9YHMKVI5X3qVWkOAbm5GTKD/ki3LXDs9:p2TK/G33eUcAaF9QX8U9Tk5bXDZm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-14_aa979faa19d139317905b0e880c83900_icedid
Files
-
2024-02-14_aa979faa19d139317905b0e880c83900_icedid.exe windows:4 windows x86 arch:x86
8fe5912bd3ca6deabe9382012227931e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenUrlA
InternetReadFile
InternetOpenA
netapi32
Netbios
kernel32
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
GlobalFlags
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
ReadFile
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
ExitThread
CreateThread
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
MoveFileA
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
SetThreadPriority
InterlockedDecrement
SetLastError
SizeofResource
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
ResetEvent
SetEvent
CreateEventA
SuspendThread
ResumeThread
CreateProcessA
WaitForSingleObject
CreateToolhelp32Snapshot
Process32First
OpenProcess
TerminateProcess
GetCurrentProcessId
Sleep
Process32Next
GetComputerNameA
GetSystemTimeAsFileTime
GetLocalTime
FormatMessageA
LocalFree
GetCurrentDirectoryA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
GetTempPathA
DeleteFileA
CreateDirectoryA
GetModuleFileNameA
CopyFileA
SetCurrentDirectoryA
GetCurrentProcess
SetPriorityClass
CreateFileA
CloseHandle
DeviceIoControl
CompareStringW
CompareStringA
FindResourceA
LoadResource
LockResource
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapAlloc
user32
CharNextA
IsRectEmpty
CopyAcceleratorTableA
InvalidateRect
InvalidateRgn
SetCapture
ReleaseCapture
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsWindow
IsChild
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
GetWindow
SetMenuItemBitmaps
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
DestroyMenu
LoadCursorA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
CheckMenuItem
GetMenuCheckMarkDimensions
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
SetFocus
ValidateRect
LoadBitmapA
LoadIconA
EnumWindows
GetWindowThreadProcessId
LoadImageA
PostQuitMessage
SetForegroundWindow
PostThreadMessageA
MessageBoxA
UnregisterClassA
IsWindowEnabled
GetActiveWindow
SetActiveWindow
GetSystemMetrics
SetRect
EnableWindow
UpdateWindow
GetClientRect
GetWindowRect
IsIconic
PostMessageA
SendMessageA
DrawIcon
CharUpperA
gdi32
ExtSelectClipRgn
DeleteDC
GetStockObject
SetViewportExtEx
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetMapMode
GetRgnBox
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateSolidBrush
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
ScaleViewportExtEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegDeleteValueA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
SHGetPathFromIDListA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromProgID
CoTaskMemAlloc
CLSIDFromString
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
CoRegisterMessageFilter
OleFlushClipboard
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
StgOpenStorageOnILockBytes
CoGetClassObject
OleIsCurrentClipboard
CoRevokeClassObject
CoFreeUnusedLibraries
OleInitialize
oleaut32
SysAllocString
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
ws2_32
WSACleanup
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ