Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_28ef28dc3538d7bb925715a4e64f66a4_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_28ef28dc3538d7bb925715a4e64f66a4_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_28ef28dc3538d7bb925715a4e64f66a4_icedid
-
Size
408KB
-
MD5
28ef28dc3538d7bb925715a4e64f66a4
-
SHA1
1890362009889272a8dea90943150d16caf479e9
-
SHA256
d88054e339316e5817d2a86537d2221dc1380cbc9e4507f4132740a8f8c62a80
-
SHA512
5429831683244730d0f3ff6d4b81a84748311c24a7e9ab96010f8a1e253fd712b0d78bae54eef37724c39d3f9d2d6b5e11bb47d63fb932ed4840241308a3ff7d
-
SSDEEP
12288:ZzscttqVBFtij8ihu27voRSATvEPuYT1LeH4dGFRwf5a:Z3qjK1LkRe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-14_28ef28dc3538d7bb925715a4e64f66a4_icedid
Files
-
2024-03-14_28ef28dc3538d7bb925715a4e64f66a4_icedid.exe windows:4 windows x86 arch:x86
11fdca93c09c96cedce42c653971070d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GlobalFlags
InterlockedIncrement
GetCPInfo
GetOEMCP
GetThreadLocale
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
GetFullPathNameA
SetErrorMode
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
HeapReAlloc
GetTimeFormatA
GetDateFormatA
VirtualAlloc
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
GlobalHandle
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
SetHandleCount
GetStdHandle
GetFileType
GetACP
IsValidCodePage
Sleep
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
FormatMessageA
LocalFree
MulDiv
GetCurrentProcessId
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
LoadLibraryA
lstrcmpW
GetModuleHandleA
GetProcAddress
GetVersionExA
TerminateProcess
GetExitCodeProcess
WritePrivateProfileStringA
SetCurrentDirectoryA
GetModuleFileNameA
GetCommandLineA
CreateMutexA
GetSystemDefaultLangID
GetLocaleInfoA
FindResourceA
LoadResource
LockResource
SizeofResource
GetPrivateProfileIntA
SystemTimeToFileTime
SetFilePointer
CreateDirectoryA
ReadFile
GetFileAttributesA
WriteFile
SetFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryA
CompareStringA
MultiByteToWideChar
CompareStringW
InterlockedExchange
lstrlenA
GetVersion
WideCharToMultiByte
GetLastError
SystemTimeToTzSpecificLocalTime
GetVolumeInformationA
GetDriveTypeA
GetLogicalDriveStringsA
DeleteFileA
CopyFileA
CloseHandle
SetLastError
DeviceIoControl
CreateFileA
lstrcatA
lstrcpyA
CreateProcessA
GlobalFree
GlobalAlloc
SetFileAttributesA
GlobalUnlock
GlobalLock
user32
SetCursor
DestroyMenu
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuState
GetWindowThreadProcessId
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
UnregisterClassA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
GetClientRect
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
OpenClipboard
CountClipboardFormats
CloseClipboard
EnumClipboardFormats
GetClipboardFormatNameA
GetClipboardData
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
CopyRect
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetPropA
ClientToScreen
EmptyClipboard
SetClipboardData
SendMessageA
PeekMessageA
AppendMenuA
LoadIconA
IsIconic
GetWindowRect
GetSystemMenu
UpdateWindow
EnableWindow
GetWindow
GetSystemMetrics
GetWindowPlacement
SystemParametersInfoA
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SetActiveWindow
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
ExtTextOutA
CreateBitmap
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
DragQueryFileA
DragFinish
SHGetFolderPathA
DragAcceptFiles
shlwapi
PathAppendA
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecA
ole32
OleUninitialize
OleInitialize
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ