Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_44e002a42bfe494228b71b2ab7d2d556_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_44e002a42bfe494228b71b2ab7d2d556_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_44e002a42bfe494228b71b2ab7d2d556_icedid
-
Size
581KB
-
MD5
44e002a42bfe494228b71b2ab7d2d556
-
SHA1
518b291a951476b42861d4e549d97c7acbf8b19a
-
SHA256
354442d5783e0488a6e68a9217d3f6bbd1a5e4821bfa59b6ee5a85190e82fa28
-
SHA512
6bef66bbce9c439c2b29c6e5f19afaf217931262a525bdf390f10f066c490e78d7deb72a2c1dae069a996f302c70dfa11b3a7aa0032f691fc381c6331084b47b
-
SSDEEP
12288:/u1m5D2uMQrIxXxW4uUu9d0a46lPkOlP:/u1m5JMWIxFu/9v4ac
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-22_44e002a42bfe494228b71b2ab7d2d556_icedid
Files
-
2024-02-22_44e002a42bfe494228b71b2ab7d2d556_icedid.exe windows:4 windows x86 arch:x86
63702fe4addfb2c13878240b4f01f6a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
VirtualProtect
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
GetLocaleInfoW
HeapFree
HeapAlloc
RtlUnwind
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetShortPathNameA
CreateFileA
GetVolumeInformationA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileA
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
InterlockedIncrement
InterlockedDecrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GlobalFlags
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
SetLastError
MulDiv
FormatMessageA
LocalFree
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
FreeResource
GetCurrentThreadId
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
GetModuleHandleA
lstrcpynA
GlobalLock
GlobalUnlock
GlobalGetAtomNameA
GlobalAddAtomA
FindResourceA
LoadResource
LockResource
SizeofResource
EnterCriticalSection
LeaveCriticalSection
GlobalAlloc
GlobalFree
FindFirstFileA
FindNextFileA
DeleteFileA
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
SetErrorMode
CloseHandle
TerminateProcess
Sleep
OpenMutexA
CreateMutexA
GetStringTypeExA
GetEnvironmentVariableA
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetEnvironmentStrings
InterlockedExchange
advapi32
RegSetValueExA
RegQueryValueExA
RegDeleteValueA
RegOpenKeyExA
RegSetValueA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
GetFileSecurityA
SetFileSecurityA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
gdi32
CreateSolidBrush
CreateFontIndirectA
CreateRectRgnIndirect
PatBlt
SetRectRgn
CombineRgn
GetMapMode
GetBkColor
GetRgnBox
CreateRectRgn
SelectClipRgn
GetStockObject
CreatePatternBrush
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
GetWindowExtEx
GetTextColor
CreateCompatibleDC
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
Ellipse
LPtoDP
CreateEllipticRgn
GetDeviceCaps
GetTextExtentPoint32A
GetTextMetricsA
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleBitmap
DeleteObject
CreateDIBSection
GetPixel
GetObjectA
SelectObject
DeleteDC
GetViewportExtEx
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipAlloc
GdipFree
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipSaveImageToStream
GdipDisposeImage
ole32
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
CreateStreamOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SystemTimeToVariantTime
OleCreateFontIndirect
SysStringLen
VariantChangeType
VariantClear
VariantInit
VarBstrCmp
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysAllocString
SysAllocStringLen
oledlg
ord8
shell32
DragFinish
DragQueryFileA
SHGetFileInfoA
ExtractIconA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
user32
SetParent
WindowFromPoint
SetRect
GetSysColorBrush
GetMenuItemInfoA
InflateRect
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadCursorA
SetCapture
ClientToScreen
SetWindowRgn
DrawIcon
FillRect
IsRectEmpty
FindWindowA
RegisterClipboardFormatA
SetWindowContextHelpId
MapDialogRect
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
ShowOwnedPopups
GetMenuStringA
InsertMenuA
PostQuitMessage
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
IsZoomed
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
MoveWindow
SetWindowTextA
IsDialogMessageA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
RemovePropA
SendDlgItemMessageA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
MessageBoxA
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
GetClientRect
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
GetScrollInfo
SetScrollInfo
LockWindowUpdate
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSystemMetrics
PtInRect
RegisterWindowMessageA
wsprintfA
LoadMenuA
DestroyMenu
GetClassNameA
GetSysColor
SetWindowPos
WinHelpA
SetFocus
GetActiveWindow
GetFocus
EqualRect
GetDlgItem
SetWindowLongA
GetKeyState
GetDlgCtrlID
GetMenu
UnpackDDElParam
GetDCEx
PostThreadMessageA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
ReuseDDElParam
LoadIconA
GetClassInfoA
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
LoadAcceleratorsA
GetParent
SetActiveWindow
IsWindowVisible
InvalidateRect
CopyAcceleratorTableA
CharNextA
DestroyIcon
DeleteMenu
GetPropA
UpdateWindow
IsIconic
InsertMenuItemA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
GetLastActivePopup
BringWindowToTop
PostMessageA
SetMenu
ShowWindow
GetWindowLongA
IsWindow
GetDesktopWindow
GetWindow
IsWindowEnabled
SendMessageA
TranslateAcceleratorA
KillTimer
SetTimer
UnregisterClassA
EnableWindow
CharUpperA
IsChild
wininet
InternetOpenUrlA
HttpAddRequestHeadersA
HttpQueryInfoA
InternetOpenA
InternetConnectA
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
ws2_32
getservbyport
WSAStartup
socket
inet_addr
WSAGetLastError
gethostbyname
inet_ntoa
htonl
getservbyname
htons
gethostbyaddr
ntohs
sendto
closesocket
Sections
.text Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
gu_idata Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
gu_rsrcs Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ