Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_d9626fb72a01fc46600ff80d858e2cdb_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-10_d9626fb72a01fc46600ff80d858e2cdb_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_d9626fb72a01fc46600ff80d858e2cdb_icedid
-
Size
364KB
-
MD5
d9626fb72a01fc46600ff80d858e2cdb
-
SHA1
3aeba01e13e1b9fff0c446c0bb548af45adbe0f6
-
SHA256
6747b6c1fc5259f90e677206382164afd148fbbda2a31bae8d0c457ebc4913b8
-
SHA512
9f9b751ac51c4f860e289da18d0c80cc0072cdb394fc7e5de96e40b7ac8f57fb0cfbb62bdfec7558640e0c43f0beb61ecff5163791bb9b91114d76c7dbcc0760
-
SSDEEP
6144:R6vSzVAqc4Xj+NoQHgP/trNI0Nl4JB7+gZjg4MTJvk5aRxN:R6apAEXyDw1NIF/MTJvN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-10_d9626fb72a01fc46600ff80d858e2cdb_icedid
Files
-
2024-03-10_d9626fb72a01fc46600ff80d858e2cdb_icedid.exe windows:4 windows x86 arch:x86
8f2efdefaf928bc64728962b1f15b2e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetDriveTypeA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetStartupInfoA
GetEnvironmentStringsW
SetHandleCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
VirtualQuery
InterlockedExchange
GetSystemInfo
VirtualAlloc
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
GetTickCount
SetFileAttributesA
SetErrorMode
GetOEMCP
GetCPInfo
GetFileTime
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedIncrement
WritePrivateProfileStringA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
VirtualProtect
CreateFileA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcatA
lstrcmpW
SetLastError
GlobalFree
MulDiv
lstrcpynA
GetCurrentThread
GetCurrentThreadId
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetCurrentProcess
GetModuleFileNameA
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateDirectoryA
GlobalAlloc
FindFirstFileA
RemoveDirectoryA
FindNextFileA
DeleteFileA
FindClose
FormatMessageA
LocalFree
GetFileAttributesA
GlobalLock
GlobalUnlock
CreateMutexA
CloseHandle
GetCurrentProcessId
TerminateProcess
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetEnvironmentVariableA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
FreeEnvironmentStringsW
user32
PostThreadMessageA
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
InvalidateRgn
CopyAcceleratorTableA
SetRect
GetSysColorBrush
wsprintfA
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowContextHelpId
MapDialogRect
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
ShowOwnedPopups
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
MoveWindow
SetWindowTextA
IsDialogMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetWindowTextLengthA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
GetMenu
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
SetWindowPos
GetWindowPlacement
CopyRect
GetWindow
SetFocus
GetDlgCtrlID
GetFocus
IsChild
GetCursorPos
ReleaseCapture
SetCursor
LoadCursorA
GetParent
SetCapture
UpdateWindow
SetWindowRgn
FillRect
OffsetRect
IsRectEmpty
SystemParametersInfoA
AdjustWindowRectEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
MessageBeep
GetNextDlgGroupItem
GetMenuItemInfoA
PostQuitMessage
ReleaseDC
GetDC
GetWindowLongA
SetWindowLongA
SetActiveWindow
GetSysColor
InvalidateRect
ClientToScreen
PtInRect
MessageBoxA
PostMessageA
FindWindowA
RegisterWindowMessageA
InflateRect
CharNextA
LoadMenuA
DestroyMenu
DispatchMessageA
UnpackDDElParam
ExitWindowsEx
RegisterClipboardFormatA
IntersectRect
CharUpperA
EnumWindows
ShowWindow
IsWindow
GetWindowTextA
GetSystemMetrics
LoadIconA
KillTimer
SetTimer
GetClientRect
GetWindowRect
IsIconic
SendMessageA
DrawIcon
EnableWindow
GetLastActivePopup
gdi32
GetRgnBox
CreateCompatibleBitmap
GetBkColor
GetTextColor
CreateFontIndirectA
SetMapMode
GetStockObject
CreateCompatibleDC
CreatePatternBrush
DeleteObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
SelectObject
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
Ellipse
LPtoDP
CreateEllipticRgn
GetTextExtentPoint32A
GetObjectA
CreateSolidBrush
CreatePen
GetWindowExtEx
GetViewportExtEx
GetMapMode
GetDeviceCaps
CreateRectRgnIndirect
Rectangle
comdlg32
PrintDlgA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
AdjustTokenPrivileges
shell32
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ord17
ImageList_Destroy
ImageList_Draw
ImageList_GetImageInfo
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromProgID
CoTaskMemAlloc
CoRevokeClassObject
CLSIDFromString
CoTaskMemFree
OleInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoFreeUnusedLibraries
oleaut32
SysAllocStringLen
OleCreateFontIndirect
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocString
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocStringByteLen
SysStringLen
VariantChangeType
VariantClear
SysFreeString
VariantInit
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 216KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ