Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_bfc7959d1ae45a3f1cad6b9f91eb3acb_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_bfc7959d1ae45a3f1cad6b9f91eb3acb_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_bfc7959d1ae45a3f1cad6b9f91eb3acb_icedid
-
Size
1.2MB
-
MD5
bfc7959d1ae45a3f1cad6b9f91eb3acb
-
SHA1
98ac0a95dedae75022d5808d6041b86929bc1040
-
SHA256
12ec89f022aea0469df8ce0c66c05ae94a6d99a96386f50ab160c45cd579f5d8
-
SHA512
30f99121b12fe784793c5f252f9c65f744c8b33924309d2f442b410b65e1208573248b9bf708aa412423a402a4e02e30f8d476adf809aca258d5cbc36774f881
-
SSDEEP
24576:HiAen7YCDClo3ICuSAu3taqRLJoJCjkliTwQ9Ctw7cmVr+EucFc:YCiDA8aqxvwYTV9CtsFTFc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-06_bfc7959d1ae45a3f1cad6b9f91eb3acb_icedid
Files
-
2024-03-06_bfc7959d1ae45a3f1cad6b9f91eb3acb_icedid.exe windows:4 windows x86 arch:x86
270458d6204129d32f7d87d923255bf6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDefaultQueueCallbackA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
winmm
waveOutOpen
shell32
ord680
ShellExecuteA
crypt32
CryptQueryObject
CryptMsgGetParam
kernel32
GetProcessVersion
GlobalFlags
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsGetValue
GetCPInfo
GetFileAttributesA
GetFileTime
SetErrorMode
TlsSetValue
LocalReAlloc
GetFileSize
GetLocalTime
GetStartupInfoA
GetCommandLineA
ExitProcess
RaiseException
CreateThread
ExitThread
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
GetTimeZoneInformation
GetCurrentDirectoryA
CompareStringW
GlobalHandle
RtlUnwind
GetModuleHandleA
GlobalReAlloc
HeapCreate
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetDriveTypeA
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
GetLocaleInfoA
SetEnvironmentVariableA
GetLocaleInfoW
GetPrivateProfileSectionA
WritePrivateProfileSectionA
GetFileAttributesExA
SetFileAttributesA
GetSystemDirectoryA
CopyFileA
lstrcmpA
GetWindowsDirectoryA
GetProcAddress
TlsFree
LeaveCriticalSection
TlsAlloc
EnterCriticalSection
GetCurrentThread
DeleteCriticalSection
InitializeCriticalSection
GetVolumeInformationA
UnlockFile
MoveFileA
SetEndOfFile
SetFilePointer
LockFile
FlushFileBuffers
GetCurrentProcess
WriteFile
ReadFile
MulDiv
DuplicateHandle
lstrcpynA
ResumeThread
SuspendThread
SetThreadPriority
lstrcmpiA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalDeleteAtom
GlobalAddAtomA
GlobalFindAtomA
GlobalUnlock
GlobalLock
LoadLibraryA
FreeLibrary
WideCharToMultiByte
LockResource
MultiByteToWideChar
DeviceIoControl
InterlockedDecrement
InterlockedIncrement
WaitForMultipleObjects
GetExitCodeProcess
GlobalFree
LCMapStringA
FormatMessageA
Sleep
SetLastError
WritePrivateProfileStringA
HeapFree
GetProcessHeap
HeapAlloc
LoadResource
FindResourceA
SizeofResource
GetCommState
GetFullPathNameA
CreateFileA
SetupComm
SetCommState
SetCommTimeouts
GlobalAlloc
EscapeCommFunction
GetCurrentProcessId
lstrlenA
OpenEventA
SetEvent
OpenProcess
LocalAlloc
LocalFree
CreateProcessA
TerminateProcess
GetVersionExA
MoveFileExA
CloseHandle
GetVersion
LCMapStringW
GetShortPathNameA
HeapDestroy
GetACP
CompareStringA
CreateEventA
lstrcatA
lstrcpyA
WaitForSingleObject
RemoveDirectoryA
DeleteFileA
FindClose
FindNextFileA
FindFirstFileA
CreateSemaphoreA
CreateDirectoryA
GetTempPathA
GetLastError
GetModuleFileNameA
user32
EndPaint
GetMessageA
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
ValidateRect
TranslateMessage
TabbedTextOutA
DrawTextA
GrayStringA
CharUpperA
PostQuitMessage
BeginPaint
GetClassNameA
PtInRect
LoadCursorA
GetSysColorBrush
DestroyMenu
SetCursor
PeekMessageA
DispatchMessageA
AdjustWindowRectEx
CopyRect
IsWindowVisible
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
SetMenuItemBitmaps
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenuCheckMarkDimensions
GetCursorPos
LoadBitmapA
DefWindowProcA
CreateWindowExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
CheckMenuItem
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetWindowRect
LoadIconA
ShowWindow
GetSystemMetrics
SetWindowPos
MessageBoxA
KillTimer
SetTimer
InvalidateRect
InflateRect
IsRectEmpty
GetClientRect
GetSysColor
GetWindowThreadProcessId
wsprintfA
LoadStringA
EnumWindows
GetWindowTextA
GetFocus
SetFocus
EnableMenuItem
SetWindowTextA
IsDialogMessageA
PostMessageA
SendMessageA
IsWindow
EnableWindow
GetMenuState
ModifyMenuA
UpdateWindow
SendDlgItemMessageA
GetDlgCtrlID
GetKeyState
RegisterClassA
MapWindowPoints
GetMenu
SetWindowsHookExA
GetWindow
SetForegroundWindow
GetPropA
UnregisterClassA
gdi32
CreateCompatibleBitmap
CreatePen
Rectangle
CreateSolidBrush
GetClipBox
SetTextColor
GetObjectA
CreateBitmap
SetBkColor
SaveDC
DeleteDC
SelectObject
GetStockObject
RestoreDC
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
DeleteObject
GetViewportExtEx
GetWindowExtEx
GetDeviceCaps
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
GetMapMode
BitBlt
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetKeySecurity
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DeleteService
FreeSid
RegEnumKeyA
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
ControlService
comctl32
ord17
olepro32
ord251
Sections
.text Size: 420KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 660KB - Virtual size: 664KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE