Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_45504eb8fad58208f434dedc648f794d_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_45504eb8fad58208f434dedc648f794d_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_45504eb8fad58208f434dedc648f794d_icedid
-
Size
305KB
-
MD5
45504eb8fad58208f434dedc648f794d
-
SHA1
8e6a031b1d0255e6fce133775380b737c3830911
-
SHA256
defd1a990de4e9b4a89dd79b149ba765602b13212e7918d31bc5f057d8429e90
-
SHA512
7554d92434074bc0b5deab3497dde3b370ec55446ebec91755cd129085c0c1524d7e54ee762ae404cd5e7e582475f9c41b2999e70cb97d4711019875a2baa83d
-
SSDEEP
6144:NsZ/ZxQoY38MRHRiFNKa38WVZzOvJYVwBUDM:NsZ/ZxQoY3N4BVUvJlD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-25_45504eb8fad58208f434dedc648f794d_icedid
Files
-
2024-02-25_45504eb8fad58208f434dedc648f794d_icedid.exe windows:5 windows x86 arch:x86
a20651e64c793dd185636ce2099469f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
GetCPInfo
GetOEMCP
RtlUnwind
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
RaiseException
GetCommandLineA
GetStartupInfoA
HeapReAlloc
VirtualAlloc
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringW
SetHandleCount
GetStdHandle
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
GetCurrentThreadId
GlobalAddAtomA
FlushFileBuffers
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetModuleHandleA
GetModuleHandleW
CompareStringA
lstrcmpA
GlobalGetAtomNameA
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
SetFileTime
DosDateTimeToFileTime
SystemTimeToFileTime
GetCurrentProcess
DuplicateHandle
GetFileType
SetFilePointer
InterlockedIncrement
WaitForSingleObject
GetModuleFileNameA
lstrlenA
GetWindowsDirectoryA
GetVolumeInformationA
GetSystemDefaultLCID
GetLocaleInfoA
lstrcpynA
CreateMutexA
GetLastError
InterlockedDecrement
ReadFile
lstrcpyA
LoadLibraryA
GetProcAddress
GlobalAlloc
GlobalReAlloc
FreeLibrary
CreateFileA
WriteFile
CloseHandle
GlobalFree
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
CreateDirectoryA
GetCurrentDirectoryA
Sleep
SetLastError
LoadResource
LockResource
SizeofResource
FindResourceA
WideCharToMultiByte
LCMapStringA
lstrcatA
advapi32
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
gdi32
CreateBitmap
GetStockObject
DeleteDC
OffsetViewportOrgEx
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
GetDeviceCaps
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
SetViewportExtEx
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysFreeString
VariantClear
VariantInit
VariantChangeType
SysAllocString
GetErrorInfo
shell32
SHFileOperationA
user32
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
CharUpperA
wsprintfA
CopyRect
SetWindowPos
SetWindowLongA
IsWindow
GetClientRect
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetWindowTextA
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
UnhookWindowsHookEx
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetDlgItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
RegisterClassA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
gu_idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
gu_rsrcs Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ