Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_a4288d9019e5bfc81d9a45b2a3f34e45_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_a4288d9019e5bfc81d9a45b2a3f34e45_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_a4288d9019e5bfc81d9a45b2a3f34e45_icedid
-
Size
1.3MB
-
MD5
a4288d9019e5bfc81d9a45b2a3f34e45
-
SHA1
b37318d05b3531550ebb06037bbefe86ff341eb3
-
SHA256
c8bee28e43435eb69e14a55e74ca3f737eb3c94e980da22529426fda3ea02885
-
SHA512
1ef78f957ecb8fbeef2caf6ebc642eb4ab813b7df46e41f3528736af488c64575ec8348eb6d806959e1b549592b4229c462f2baaf14cd4f603c9082ff88b1b6b
-
SSDEEP
24576:ZaYB0ThErSx9vLo3oiP5r8Zjd4g3R1/emDUCRxD81:pB0tMP5oj//emDUSc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-12_a4288d9019e5bfc81d9a45b2a3f34e45_icedid
Files
-
2024-03-12_a4288d9019e5bfc81d9a45b2a3f34e45_icedid.exe windows:4 windows x86 arch:x86
08c3272a4218c2b4d2c1c0b46c136fee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
ImageList_Destroy
ImageList_LoadImageA
ImageList_Draw
InitCommonControlsEx
ImageList_GetImageInfo
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
imm32
ImmGetVirtualKey
kernel32
GetCurrentProcess
GetVolumeInformationA
GetShortPathNameA
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SetErrorMode
RtlUnwind
HeapFree
HeapAlloc
HeapReAlloc
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
ExitProcess
TerminateProcess
HeapSize
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
UnlockFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetProcessHeap
SetEnvironmentVariableA
LockFile
DuplicateHandle
GetLocalTime
WritePrivateProfileStringA
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
InterlockedIncrement
GlobalFlags
GetFullPathNameA
GetFileTime
SetFileTime
ResumeThread
ConvertDefaultLocale
EnumResourceLanguagesA
SystemTimeToFileTime
FileTimeToSystemTime
InterlockedDecrement
GetCurrentThreadId
GlobalGetAtomNameA
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
FreeLibrary
LocalFree
WideCharToMultiByte
GetModuleHandleA
GetProcAddress
LoadLibraryA
MultiByteToWideChar
GetExitCodeProcess
CreateProcessA
FindClose
FindFirstFileA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
SetLastError
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
FlushFileBuffers
SetEndOfFile
GlobalAlloc
FormatMessageA
lstrcpynA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetOEMCP
GetUserDefaultLCID
lstrcmpA
SetThreadPriority
GetCurrentThread
GetStringTypeExW
GetStringTypeExA
CompareStringW
CompareStringA
lstrlenA
GetVersion
WriteFile
GetDateFormatA
SetFileAttributesA
CreateFileA
ReadFile
SetFilePointer
GetFileSize
GetFileAttributesA
GetCommandLineA
GetModuleFileNameA
OpenMutexA
GetDiskFreeSpaceA
FindNextFileA
lstrcpyA
lstrcmpiA
ResetEvent
SetEvent
GetWindowsDirectoryA
GetTempFileNameA
DeleteFileA
GetTempPathA
CreateDirectoryA
MoveFileExA
MoveFileA
GetLastError
CreateEventA
GetDriveTypeA
CreateMutexA
GetExitCodeThread
CloseHandle
IsDBCSLeadByte
ReleaseMutex
WaitForSingleObject
GetTickCount
Sleep
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
MulDiv
DebugBreak
user32
UnpackDDElParam
ShowOwnedPopups
ValidateRect
GetMessageA
DestroyIcon
GetDCEx
SetParent
WinHelpA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
IsChild
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
MessageBoxA
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
IntersectRect
GetWindowPlacement
GetWindowTextLengthA
MoveWindow
GetDlgCtrlID
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
CheckRadioButton
GetMenuItemID
GetMenuItemCount
GetDesktopWindow
IsWindow
IsDlgButtonChecked
CheckDlgButton
SetWindowTextA
PostQuitMessage
SetWindowPos
BeginPaint
EndPaint
DefWindowProcA
DestroyWindow
DrawFocusRect
ReuseDDElParam
GetClassInfoA
ClientToScreen
DrawTextA
GetKeyState
MsgWaitForMultipleObjects
IsZoomed
LoadMenuA
GetSubMenu
CharUpperA
SetPropA
GetPropA
SetWindowLongA
RemovePropA
CallWindowProcA
GetDlgItem
LoadStringA
GetCapture
IsRectEmpty
WindowFromPoint
SetCapture
ReleaseCapture
RegisterWindowMessageA
WaitForInputIdle
ShowWindow
DefDlgProcA
RegisterClassExA
IsIconic
SendMessageTimeoutA
DrawIcon
FindWindowA
SetRectEmpty
GetWindow
LoadImageA
GetIconInfo
DrawFrameControl
LockWindowUpdate
SystemParametersInfoA
EnumWindows
GetWindowTextA
SetForegroundWindow
SetActiveWindow
InsertMenuItemA
LoadAcceleratorsA
LoadIconA
GetSystemMetrics
EnumChildWindows
SetFocus
TranslateAcceleratorA
LoadCursorA
SetCursor
GetWindowLongA
GetForegroundWindow
GetNextDlgTabItem
IsWindowEnabled
GetClassNameA
ReleaseDC
GetSystemMenu
DrawMenuBar
GetMenu
GetMenuState
EnableMenuItem
AppendMenuA
DeleteMenu
CreatePopupMenu
DrawEdge
GetSysColorBrush
CopyRect
OffsetRect
DrawStateA
BringWindowToTop
SetMenu
DestroyMenu
GetMenuItemInfoA
DestroyCursor
SetCursorPos
RedrawWindow
SetWindowRgn
GetWindowDC
GrayStringA
DrawTextExA
TabbedTextOutA
SetMenuItemBitmaps
ModifyMenuA
CheckMenuItem
GetMenuCheckMarkDimensions
RegisterClassA
LoadBitmapA
EndDialog
GetActiveWindow
IsWindowVisible
PeekMessageA
DispatchMessageA
TranslateMessage
GetDC
GetClientRect
FillRect
GetCursorPos
GetAsyncKeyState
KillTimer
SetTimer
ScreenToClient
PostMessageA
FrameRect
InflateRect
SetRect
PtInRect
GetParent
InvalidateRect
UpdateWindow
GetSysColor
wsprintfA
UnregisterClassA
SendMessageA
EnableWindow
GetFocus
GetWindowRect
CreateWindowExA
CreateDialogIndirectParamA
gdi32
CreateSolidBrush
SetMapMode
ExcludeClipRect
IntersectClipRect
SelectClipRgn
CreateRectRgn
PtVisible
RectVisible
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreatePatternBrush
CreateEllipticRgn
DPtoLP
LPtoDP
Ellipse
SetRectRgn
CombineRgn
GetCharWidthA
CreateFontA
GetTextMetricsA
GetBkColor
RestoreDC
SaveDC
CreateRectRgnIndirect
GetClipBox
ExtSelectClipRgn
RoundRect
Rectangle
PatBlt
MoveToEx
LineTo
CreateDIBSection
SetStretchBltMode
StretchBlt
DeleteDC
SetBkMode
StretchDIBits
GetPixel
CreatePen
DeleteObject
SetPixel
GetCurrentPositionEx
TextOutA
SelectObject
CreateBitmap
SetBkColor
SetTextColor
GetStockObject
GetObjectA
GetDeviceCaps
GetTextExtentPoint32A
CreateFontIndirectA
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
GetFileSecurityA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegEnumValueA
RegSetValueA
RegOpenKeyA
RegEnumKeyA
RegCreateKeyA
RegCloseKey
SetFileSecurityA
RegQueryValueA
shell32
DragQueryFileA
SHGetSpecialFolderLocation
SHGetFileInfoA
ShellExecuteA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
SHBrowseForFolderA
ExtractIconA
SHGetDesktopFolder
DragFinish
shlwapi
PathAddBackslashA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathRemoveBackslashA
PathIsUNCA
ole32
OleUninitialize
CoTaskMemFree
OleInitialize
CoUninitialize
CLSIDFromProgID
CoCreateInstance
CoInitialize
DoDragDrop
CoInitializeEx
oleaut32
VariantClear
VariantInit
VariantChangeType
SysFreeString
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
SysAllocString
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ