Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_378618e1e0eabac3d0b4397f28b88e3e_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_378618e1e0eabac3d0b4397f28b88e3e_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-18_378618e1e0eabac3d0b4397f28b88e3e_icedid
-
Size
2.3MB
-
MD5
378618e1e0eabac3d0b4397f28b88e3e
-
SHA1
840c340b9ffd959959690cd220ae0908526c7c23
-
SHA256
06efc6f06e41834ff4370047c67fec0549bff53ad1780f3cd08e83edd2986099
-
SHA512
e6ed0d23c1f90d3c81cd02e4f758608821fe178b64d8ae0cbab3fbbbc0655f28223ee36e3d2e705f50eeaaf61960d7dba7475751e005f79b124cea8e39933fa5
-
SSDEEP
49152:VRE3gYQNyP3fucdQN+DSDc1a+aVfP7W+/C4EEY3dupzrkOYI7xYBvQjnb3QeZvzi:VRyQNyP3fucdQN+DSDc1a+aVP7WIzY3l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-18_378618e1e0eabac3d0b4397f28b88e3e_icedid
Files
-
2024-03-18_378618e1e0eabac3d0b4397f28b88e3e_icedid.exe windows:4 windows x86 arch:x86
5d6fd3fe3129df35bfcaa2129cd4151f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mumsg
??0CMsg@@QAE@XZ
?LoadWTF@CMsg@@QAEXPAD@Z
??1CMsg@@QAE@XZ
?Get@CMsg@@QAEPADH@Z
winmm
sndPlaySoundA
timeGetTime
ws2_32
connect
inet_ntoa
WSAAsyncSelect
WSACleanup
WSAStartup
closesocket
recv
WSAGetLastError
socket
gethostbyname
inet_addr
htons
send
wz_zp
BZ2_bzDecompressInit
BZ2_bzDecompress
BZ2_bzDecompressEnd
kernel32
SetFileTime
GetFileTime
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalAlloc
lstrcmpA
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
CreateEventA
InterlockedIncrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
SystemTimeToFileTime
GetTickCount
RaiseException
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
ExitProcess
HeapSize
SetStdHandle
GetFileType
SetHandleCount
GetStdHandle
VirtualFree
HeapDestroy
HeapCreate
GetACP
IsValidCodePage
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetExitCodeProcess
CreateProcessA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetThreadLocale
GetCurrentProcessId
GetModuleFileNameA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
GetVersionExA
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
FreeResource
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
GetModuleHandleA
GetProcAddress
GetFileAttributesA
CreateDirectoryA
Sleep
WaitForSingleObject
ResetEvent
RemoveDirectoryA
DeleteFileA
CopyFileA
CreateFileA
GetFileSize
ReadFile
WriteFile
CloseHandle
WritePrivateProfileStringA
GetCurrentDirectoryA
GetPrivateProfileStringA
CreateMutexA
SetFileAttributesA
FindResourceA
LoadResource
LockResource
SizeofResource
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
SetErrorMode
user32
ShowWindow
GetWindowThreadProcessId
ValidateRect
GetCursorPos
GetMessageA
SetCursor
MapDialogRect
SetWindowContextHelpId
CharNextA
GetSysColorBrush
LoadCursorA
UnregisterClassA
DestroyMenu
SetCapture
ReleaseCapture
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetPropA
RemovePropA
GetFocus
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
SetWindowTextA
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
ClientToScreen
UnhookWindowsHookEx
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindowEnabled
EndDialog
GetWindowTextA
GetWindow
SetFocus
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
LoadImageA
GetWindowLongA
SetWindowLongA
GetClassNameA
IsChild
GetDC
FindWindowA
PostQuitMessage
SetRect
LoadIconA
KillTimer
SetTimer
DrawIcon
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
GetSysColor
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
IsWindow
GetParent
RedrawWindow
InvalidateRect
CharUpperA
GetDlgItem
MoveWindow
GetSystemMetrics
SendMessageA
EnableWindow
GetClientRect
IsDialogMessageA
CheckRadioButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
RegisterClassA
CheckMenuItem
IsIconic
PostMessageA
LoadBitmapA
GetNextDlgTabItem
SetPropA
gdi32
RealizePalette
CreatePalette
DeleteObject
StretchBlt
SelectObject
StretchDIBits
SetDIBitsToDevice
GetDIBits
GetDeviceCaps
SaveDC
RestoreDC
SetBkColor
SetBkMode
SetTextAlign
GetViewportExtEx
GetWindowExtEx
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetStockObject
ExtSelectClipRgn
DeleteDC
CreateBitmap
SelectPalette
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetClipBox
SetMapMode
GetCurrentObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
CreateCompatibleDC
CreateFontIndirectA
GetObjectA
SetTextColor
SetStretchBltMode
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyExA
RegOpenKeyA
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHFileOperationA
ShellExecuteA
shlwapi
PathIsUNCA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
oledlg
ord8
ole32
CoTaskMemFree
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
oleaut32
SysAllocString
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantClear
VariantChangeType
SystemTimeToVariantTime
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
OleCreateFontIndirect
wininet
InternetConnectA
InternetOpenA
FtpGetFileA
InternetReadFile
FtpOpenFileA
InternetFindNextFileA
FtpFindFirstFileA
FtpSetCurrentDirectoryA
FtpGetCurrentDirectoryA
InternetGetLastResponseInfoA
InternetSetStatusCallback
InternetCloseHandle
Sections
.text Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ