Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_0661f2dd96a8ce6debb404c65e769fc8_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_0661f2dd96a8ce6debb404c65e769fc8_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_0661f2dd96a8ce6debb404c65e769fc8_icedid
-
Size
312KB
-
MD5
0661f2dd96a8ce6debb404c65e769fc8
-
SHA1
c8f9a38158eb56f54184212ab186dc632baccace
-
SHA256
40e4502295522199f3268c69b7807b4d05f272d6651109047cdc2ebe148f5b46
-
SHA512
b48f17243c3934f9e24d7726923012ad5f6b30a1e7b165b90dbd960945f1fe5473d5c282b7aa0ec2f6e4c2d47322b2c50182395138865ca350ca0fec389642fd
-
SSDEEP
6144:o67nut3p6r7R6ftvVY3kDjUmpSZwyNRZvILhXF1:hQ56rtEJVY0DCOeK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-10_0661f2dd96a8ce6debb404c65e769fc8_icedid
Files
-
2024-03-10_0661f2dd96a8ce6debb404c65e769fc8_icedid.exe windows:4 windows x86 arch:x86
af04c0a7a6f85db51863b57ae89bd2d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeKillEvent
timeSetEvent
reesdata
??1CReesData@@QAE@XZ
?gettime@@YAXPAJ@Z
?BackupDatabase@CReesData@@QAE_NPBD0@Z
?RestoreDatabase@CReesData@@QAE_NPBD0_N@Z
?Decryptpw@CReesData@@QAEPBDPBD@Z
?geterrors@CReesData@@QAEPBDXZ
?maketime@@YAXPADPAUclock@@PAUparmhead@@_N@Z
?calcraw@@YAXJPAUclock@@@Z
?timetobuf@@YAXPADGPAUparmhead@@_N@Z
?Encryptpw@CReesData@@QAEPBDPBD@Z
?getpctime@@YAKPAUclock@@_N@Z
?OpenDB@CReesData@@QAE_N_NPBD@Z
?SetDatabaseType@CReesData@@QAEX_N@Z
??0CReesData@@QAE@XZ
?cstrtotime@@YAFAAV?$CStringT@DV?$StrTraitMFC@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@PAGPAUparmhead@@_N@Z
?timetocstr@@YAXAAV?$CStringT@DV?$StrTraitMFC@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@GPAUparmhead@@_N@Z
?elaptens@@YAJPAJ@Z
kernel32
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
TerminateProcess
FindNextFileA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetDriveTypeA
CreateDirectoryA
GetTickCount
GetCommandLineA
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetErrorMode
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedIncrement
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
GetFileTime
GetFileSize
GetFileAttributesA
SetFileAttributesA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
InterlockedDecrement
FreeResource
GlobalAddAtomA
SetLastError
GlobalFree
MulDiv
GlobalUnlock
lstrcpynA
LocalFree
GetCurrentThread
GlobalLock
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
GetModuleFileNameA
GetCurrentThreadId
OutputDebugStringA
GetComputerNameA
GetDiskFreeSpaceExA
FormatMessageA
GetCurrentDirectoryA
CreateThread
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
Sleep
CreateFileA
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetStartupInfoA
user32
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
FillRect
wsprintfA
ReleaseDC
GetDC
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
PtInRect
GetSysColor
SystemParametersInfoA
DestroyMenu
GetMenuItemInfoA
InflateRect
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetNextDlgTabItem
EndDialog
UnhookWindowsHookEx
SetWindowContextHelpId
MapDialogRect
GetWindowTextLengthA
GetWindowTextA
CreatePopupMenu
SetFocus
MessageBeep
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
ValidateRect
MessageBoxA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
ShowOwnedPopups
SetCursor
GetMenuState
GetMenuItemCount
PostQuitMessage
SetMenuDefaultItem
GetCursorPos
TrackPopupMenu
LoadMenuA
GetSubMenu
GetMenuItemID
PostMessageA
GetDesktopWindow
DrawTextA
RegisterWindowMessageA
SetForegroundWindow
PeekMessageA
DispatchMessageA
TranslateMessage
GetSystemMetrics
EnableWindow
InsertMenuItemA
InvalidateRect
LoadAcceleratorsA
ReleaseCapture
SetParent
PostThreadMessageA
LockWindowUpdate
GetDCEx
LoadIconA
KillTimer
SetTimer
GetClientRect
GetWindowRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
OffsetRect
UnregisterClassA
RegisterClipboardFormatA
SetWindowPos
UpdateWindow
CharUpperA
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
GetSysColorBrush
LoadCursorA
WindowFromPoint
SetCapture
IsZoomed
UnpackDDElParam
ShowWindow
ReuseDDElParam
CopyRect
gdi32
GetStockObject
GetWindowExtEx
CreateSolidBrush
CreateCompatibleBitmap
GetTextMetricsA
GetBkColor
GetTextColor
GetRgnBox
SetRectRgn
CombineRgn
GetMapMode
CreatePatternBrush
GetViewportExtEx
CreateRectRgn
SelectClipRgn
DeleteObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
SetBkMode
RestoreDC
SaveDC
PatBlt
CreateRectRgnIndirect
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
ExtTextOutA
BitBlt
CreateFontIndirectA
GetObjectA
CreateBitmap
GetDeviceCaps
CreateCompatibleDC
IntersectClipRect
ExcludeClipRect
SetMapMode
GetPixel
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegisterServiceCtrlHandlerA
LogonUserA
RevertToSelf
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegDeleteValueA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
StartServiceCtrlDispatcherA
ImpersonateLoggedOnUser
SetServiceStatus
DeleteService
CreateServiceA
RegCreateKeyA
DeregisterEventSource
RegisterEventSourceA
ReportEventA
ControlService
StartServiceA
QueryServiceStatus
shell32
DragQueryFileA
SHBrowseForFolderA
SHGetMalloc
Shell_NotifyIconA
SHGetPathFromIDListA
DragFinish
comctl32
ord17
ImageList_Destroy
ImageList_Draw
ImageList_GetImageInfo
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
oleaut32
SysFreeString
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
OleCreateFontIndirect
SysAllocString
SysAllocStringByteLen
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
Sections
.text Size: 212KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ