Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_94277ad718d89f51119e490b9368b02e_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_94277ad718d89f51119e490b9368b02e_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-18_94277ad718d89f51119e490b9368b02e_icedid
-
Size
6.7MB
-
MD5
94277ad718d89f51119e490b9368b02e
-
SHA1
1fdec8b30b88c80202a98ccd70936bbc92b71d7c
-
SHA256
5b03b8402db0e541f509133c407ccf2d67790fb38cb0293741b04e50a886a7fa
-
SHA512
fb17360f43acc3c117b5750f3eb9ca58fbc0ef100c7d176619874e6197efc6220639066f96ab41952f7e9a53d918372757a7ba17bade010637670e5a1365e462
-
SSDEEP
98304:HkC3I44Ig8aV2D3UBry5hWHl6WXLt0y6TU7nSvXLL/vxWRtXFATr:HkC3L4FcDkBWTAljXLW55LLYRtXaTr
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-18_94277ad718d89f51119e490b9368b02e_icedid
Files
-
2024-03-18_94277ad718d89f51119e490b9368b02e_icedid.exe windows:4 windows x86 arch:x86
87a0a21758b205e89ac1d28befc2734e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipAlloc
GdipCreateFromHDC
GdipDeleteGraphics
GdipReleaseDC
GdipSetTextRenderingHint
GdipDrawString
GdipDrawImageRectI
GdipDrawImagePointRectI
GdipDeleteBrush
GdipCreateFontFamilyFromName
GdipFree
GdipCreateFont
GdipCloneFont
GdipDeleteFont
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipDisposeImage
GdipCloneImage
GdipGetImageWidth
GdipGetImageHeight
GdipDeleteFontFamily
GdipCloneBrush
GdipCreateSolidFill
GdiplusShutdown
GdiplusStartup
GdipDrawImageRectRectI
imagehlp
CheckSumMappedFile
kernel32
GetThreadLocale
FlushFileBuffers
LockFile
UnlockFile
DuplicateHandle
GetVolumeInformationW
InterlockedExchange
CompareStringA
GetLocaleInfoW
lstrcmpA
EnumResourceLanguagesW
ConvertDefaultLocale
GetCurrentThread
GetCurrentProcessId
WritePrivateProfileStringW
GetTickCount
InterlockedDecrement
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
FileTimeToLocalFileTime
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
SetErrorMode
lstrlenA
GetStartupInfoW
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
ExitProcess
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
MulDiv
GetModuleHandleA
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
SetLastError
lstrcmpW
GetVersionExA
GlobalFree
WideCharToMultiByte
MultiByteToWideChar
SearchPathW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
GetTempPathW
GetLongPathNameW
MoveFileW
GetSystemDirectoryW
GetWindowsDirectoryW
GetDriveTypeW
RemoveDirectoryW
SetFileAttributesW
SetEndOfFile
SetFileTime
FindNextFileW
FreeResource
lstrcpyW
GetShortPathNameW
CreateDirectoryW
GetFileTime
FileTimeToSystemTime
GetLastError
FormatMessageW
LocalFree
SetFilePointerEx
GlobalAlloc
GlobalLock
GlobalUnlock
ReadFile
lstrcpynW
FreeLibrary
CreateProcessW
WaitForSingleObject
GetTempFileNameW
MoveFileExW
DeleteFileW
GetVersion
GetProcessHeap
HeapAlloc
HeapFree
CreateFileMappingW
MapViewOfFile
IsBadReadPtr
UnmapViewOfFile
lstrcatW
Sleep
CopyFileW
CreateFileW
GetFileSize
CloseHandle
SetFilePointer
WriteFile
LoadResource
LockResource
SizeofResource
FindResourceW
GetFileAttributesW
FindFirstFileW
FindClose
GetModuleFileNameW
lstrlenW
LoadLibraryW
GetVersionExW
GetModuleHandleW
GetProcAddress
GetCurrentProcess
TlsSetValue
user32
GetWindowDC
CharUpperW
ValidateRect
SetCursor
GetWindowThreadProcessId
RegisterClipboardFormatW
MapDialogRect
SetWindowContextHelpId
DestroyMenu
GetSysColorBrush
SetCapture
ReleaseCapture
PostThreadMessageW
CharNextW
CopyAcceleratorTableW
SetRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
UnregisterClassW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
UnregisterClassA
PeekMessageW
MapWindowPoints
TrackPopupMenu
ClientToScreen
SetForegroundWindow
IsWindowVisible
GetMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
LoadIconW
GetParent
GetDesktopWindow
InvalidateRect
GetClientRect
GetWindowRect
IsIconic
GetSystemMenu
LoadMenuW
GetSubMenu
AppendMenuW
DrawIcon
IsRectEmpty
LoadCursorW
SetClassLongW
GetWindowTextW
GetClassNameW
GetWindow
SetWindowPos
IsWindow
PtInRect
SendMessageW
FindWindowW
FindWindowExW
PostMessageW
CopyRect
BeginPaint
FillRect
EndPaint
GetDlgItem
SetWindowTextW
DestroyWindow
PostQuitMessage
CreateDialogParamW
ShowWindow
UpdateWindow
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
GetCursorPos
LoadCursorFromFileW
CopyIcon
SetSystemCursor
GetWindowLongW
SetWindowLongW
UpdateLayeredWindow
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
MoveWindow
GetDC
ReleaseDC
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetKeyState
LoadBitmapW
GetSystemMetrics
wsprintfW
EnableWindow
ExitWindowsEx
MessageBoxW
IsWindowEnabled
GetMessagePos
gdi32
SetBkColor
GetObjectW
CreateBitmap
SaveDC
RestoreDC
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
ExtTextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ExtSelectClipRgn
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
CreateDCW
BitBlt
GetStockObject
CreatePen
CreateFontIndirectW
CreateSolidBrush
SetBkMode
TextOutW
SetTextColor
MoveToEx
LineTo
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
GetDeviceCaps
SetMapMode
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegCloseKey
RegQueryValueW
RegEnumKeyW
RegOpenKeyW
GetUserNameW
RegCreateKeyExW
AdjustTokenPrivileges
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
OpenProcessToken
LookupPrivilegeValueW
shell32
SHGetMalloc
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
SHFileOperationW
comctl32
InitCommonControlsEx
shlwapi
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFileExistsW
PathFindFileNameW
oledlg
OleUIBusyW
ole32
CoInitialize
CreateStreamOnHGlobal
CoTaskMemFree
CoCreateInstance
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoTaskMemAlloc
oleaut32
VariantClear
SysFreeString
SysStringLen
VariantInit
VariantChangeType
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysAllocStringLen
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 328KB - Virtual size: 325KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ