Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_e2347bfad1264f57458ab51f874adb66_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_e2347bfad1264f57458ab51f874adb66_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_e2347bfad1264f57458ab51f874adb66_icedid
-
Size
424KB
-
MD5
e2347bfad1264f57458ab51f874adb66
-
SHA1
57e049219d4b71330825e8bb6cc48968699636ee
-
SHA256
00f2099eccfc3402a40c02ec799bf7b30baafc78a27428536e971652403961ea
-
SHA512
59f26d238130768f99945d197a1c9b2c2ec319f124875185c689b64ae92644f8e53483532fa506ec8b8320b07a83b8a448dc42e9d687996a77e797644ff0b717
-
SSDEEP
6144:pOiffsCghl0RZnvT0QjQbs01O+rKC7Mx3++eTH2XQ098vKXKzVEsgtHhp0Wr:pOsfMhlhDr7Mx3++62g098iXuhgtnp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-23_e2347bfad1264f57458ab51f874adb66_icedid
Files
-
2024-02-23_e2347bfad1264f57458ab51f874adb66_icedid.exe windows:4 windows x86 arch:x86
bacd2da389633821b5291bf4d068e7fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathStripToRootW
PathAppendW
PathFindFileNameW
StrCatW
PathFileExistsW
SHDeleteValueW
SHGetValueW
SHSetValueW
PathIsUNCW
wininet
HttpQueryInfoW
HttpSendRequestW
HttpOpenRequestW
InternetCloseHandle
InternetConnectW
InternetOpenW
InternetReadFile
rpcrt4
UuidCreate
kernel32
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetModuleHandleW
InterlockedDecrement
GetVersion
GetModuleHandleA
GetFileAttributesW
GetFileTime
lstrcmpW
GlobalFlags
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
CompareStringA
GetLocaleInfoW
RaiseException
EnterCriticalSection
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
HeapAlloc
GetProcessHeap
GetStartupInfoA
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
SetStdHandle
GetFileType
SetHandleCount
CreateFileA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetLocaleInfoA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
SetEnvironmentVariableA
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetThreadLocale
ReleaseSemaphore
CreateSemaphoreW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetSystemTime
LocalFree
SetCurrentDirectoryW
GetCurrentDirectoryW
GetCurrentThreadId
GetLocalTime
FileTimeToLocalFileTime
FileTimeToSystemTime
OutputDebugStringW
FormatMessageW
CompareStringW
GetTempFileNameW
lstrlenA
lstrcpynW
WideCharToMultiByte
InterlockedCompareExchange
InterlockedIncrement
ReleaseMutex
WaitForSingleObject
FindFirstFileW
FindNextFileW
FindClose
SetLastError
CreateMutexW
CreateDirectoryW
Sleep
LoadLibraryW
GetProcAddress
GetCurrentProcessId
FreeLibrary
GetComputerNameW
GetLastError
DeleteFileW
RemoveDirectoryW
GetTempPathW
CreateFileW
GetModuleFileNameW
lstrlenW
WriteFile
CloseHandle
CreateProcessW
SetThreadPriority
GetCurrentThread
GetCurrentProcess
SetPriorityClass
ResumeThread
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetVersionExW
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
RtlUnwind
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowPos
SetWindowLongW
GetDlgItem
GetFocus
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
SetWindowsHookExW
CallNextHookEx
GetKeyState
PeekMessageW
ValidateRect
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowTextW
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetActiveWindow
EnumThreadWindows
IsWindowVisible
EnableWindow
IsWindow
RegisterWindowMessageW
RegisterClassExW
CreateWindowExW
SetTimer
GetMessageW
SetMessageExtraInfo
TranslateMessage
DispatchMessageW
DefWindowProcW
GetMessageExtraInfo
PostQuitMessage
MessageBoxW
wsprintfW
ClientToScreen
UnregisterClassA
gdi32
CreateBitmap
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteObject
DeleteDC
comdlg32
GetFileTitleW
GetOpenFileNameW
GetSaveFileNameW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryInfoKeyW
RegEnumValueW
RegQueryValueW
RegOpenKeyW
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteW
ole32
CoInitializeEx
StringFromGUID2
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 328KB - Virtual size: 326KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ