Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_4ba0de84b308b3c3accfdd12137e7e34_icedid.exe
Resource
win7-20240221-en
General
-
Target
2024-03-06_4ba0de84b308b3c3accfdd12137e7e34_icedid
-
Size
2.1MB
-
MD5
4ba0de84b308b3c3accfdd12137e7e34
-
SHA1
34ac19b94e2ee8de252921c88a5a2991303fb294
-
SHA256
09cb6d2c081df092881f8b0005ee865c5bff9af84b39a2aae16e226eb8732d2c
-
SHA512
6b1919ed6fc44f66a93eb8515ea484797703d0d286a0d2dd6c4fd9022f81ef0308616374b594021fecb5eba5da4b0aeb9c2c38020454bcbfa866e1fdd9e54d7d
-
SSDEEP
49152:hutsK3gRoMqYD+yARcsFb2OYXqBsg0UJ:huttaoMquSb2OY6Bsg0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-06_4ba0de84b308b3c3accfdd12137e7e34_icedid
Files
-
2024-03-06_4ba0de84b308b3c3accfdd12137e7e34_icedid.exe windows:4 windows x86 arch:x86
f883e86999fbee6e34b24cdff6519b83
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
setupapi
SetupIterateCabinetA
kernel32
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
ExitThread
CreateThread
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetErrorMode
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GlobalFlags
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
InterlockedDecrement
SetLastError
MulDiv
FormatMessageA
LocalFree
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
FreeResource
OpenMutexA
CreateMutexA
GetModuleFileNameA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
WaitForSingleObject
CreateProcessA
WinExec
CreateDirectoryA
SetFileAttributesA
DeleteFileA
CopyFileA
GetCurrentProcess
GetWindowsDirectoryA
GetSystemDirectoryA
FindFirstFileA
FindClose
CloseHandle
EnterCriticalSection
LeaveCriticalSection
lstrlenA
lstrcmpiA
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LCMapStringW
user32
GetMenuItemInfoA
InflateRect
GetSysColorBrush
ShowOwnedPopups
PostQuitMessage
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
LoadMenuA
DestroyMenu
UnpackDDElParam
ReuseDDElParam
SetCursor
ReleaseCapture
LoadAcceleratorsA
InvalidateRect
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
SetMenu
TranslateAcceleratorA
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
TrackPopupMenu
GetKeyState
SetForegroundWindow
IsWindowVisible
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
UpdateWindow
ExitWindowsEx
wsprintfA
GetSystemMetrics
LoadImageA
UnregisterClassA
LoadIconA
LoadCursorA
FindWindowA
KillTimer
SetTimer
GetWindowRect
BringWindowToTop
PostMessageA
SendMessageA
EnableWindow
gdi32
GetTextExtentPoint32A
CreateFontIndirectA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
GetStockObject
CreatePatternBrush
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetDIBColorTable
DeleteDC
StretchBlt
SelectObject
CreateCompatibleDC
CreateFontA
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
CreateCompatibleBitmap
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
AddFontResourceA
CreateSolidBrush
CreateDIBSection
DeleteObject
GetObjectA
SetViewportOrgEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
AdjustTokenPrivileges
RegCreateKeyExA
RegQueryValueA
shell32
DragQueryFileA
DragFinish
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
ole32
CoUninitialize
CoInitialize
oleaut32
VariantInit
VariantChangeType
VariantClear
gdiplus
GdipGetImagePalette
GdipCloneImage
GdipAlloc
GdipDrawImageI
GdipGetImageGraphicsContext
GdipFree
GdiplusShutdown
GdiplusStartup
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromFile
GdipGetImagePaletteSize
GdipDeleteGraphics
GdipDisposeImage
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
shlwapi
PathFindExtensionA
PathFindFileNameA
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE