Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_6019c5961e237a1381aa36cc4a3fccf0_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-11_6019c5961e237a1381aa36cc4a3fccf0_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-11_6019c5961e237a1381aa36cc4a3fccf0_icedid
-
Size
2.1MB
-
MD5
6019c5961e237a1381aa36cc4a3fccf0
-
SHA1
cc5ba15418bbb538fd4043339caed3798da708f8
-
SHA256
0fe983f987430868725bac63642ec55c8967ee51320c784f61fa8a3ab20ff998
-
SHA512
94724ff7db54559fd87f87d062e77f9acb3e23a4576e02cf98354a9de26418a089795a2497bfe2a5855149ccb1a1b3377ce92e8f6cbfaed8e936cf7c16b57d97
-
SSDEEP
24576:EbUjH1KpZLtA+0XAo+t7T4k1UzylJQaFl0SteQ0MngHaJogxmPOMkdukPc1fAuA8:RmhtTYj+5kmQymcgL8K1fAuAx2/9ttF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-11_6019c5961e237a1381aa36cc4a3fccf0_icedid
Files
-
2024-04-11_6019c5961e237a1381aa36cc4a3fccf0_icedid.exe windows:5 windows x86 arch:x86
5bc826bf2741cccc5ef0d4bfbf2827f9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dsound
ord11
d3d9
Direct3DCreate9
winmm
timeGetTime
timeKillEvent
comctl32
ord17
bass
BASS_Init
BASS_GetVersion
BASS_Free
BASS_Start
gamesg
?TaskSwitching_Enable_Disable@@YGHH@Z
?AltTab2_Enable_Disable@@YGHPAUHWND__@@H@Z
?CtrlAltDel_Enable_Disable@@YGHH@Z
kernel32
GetModuleFileNameW
CreateMutexA
CloseHandle
GetSystemInfo
GetTickCount
GetModuleHandleA
GetVersionExA
lstrlenA
FreeLibrary
SetEvent
WritePrivateProfileStringA
GetPrivateProfileStringA
LoadLibraryA
InitializeCriticalSection
CreateProcessA
GetLastError
GetProcAddress
DeleteCriticalSection
GetModuleFileNameA
Sleep
WaitForSingleObject
HeapFree
GetProcessHeap
HeapAlloc
CreateDirectoryA
GetFileAttributesA
InterlockedExchange
LeaveCriticalSection
EnumResourceLanguagesA
ConvertDefaultLocale
LoadLibraryExA
GetLocaleInfoA
GetCurrentThread
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
CompareStringA
GlobalAddAtomA
SetLastError
FreeResource
GlobalFree
GlobalUnlock
GlobalFindAtomA
GlobalGetAtomNameA
lstrcmpW
LocalFree
GetAtomNameA
SetErrorMode
GlobalFlags
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
FlushFileBuffers
SetEndOfFile
GetCPInfo
GetOEMCP
GetModuleHandleW
LoadLibraryW
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
ExitProcess
ExitThread
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapValidate
VirtualQuery
GetStdHandle
WriteConsoleW
GetFileType
SetHandleCount
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
SetStdHandle
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
GetStringTypeA
GetStringTypeW
HeapSize
HeapReAlloc
WriteConsoleA
GetConsoleOutputCP
OpenEventA
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
SizeofResource
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
InterlockedDecrement
InterlockedIncrement
OutputDebugStringW
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
MulDiv
CreateThread
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
QueryPerformanceFrequency
FindResourceA
LoadResource
LockResource
WriteFile
ReadFile
GetFileSize
SetFilePointer
CreateEventA
ResetEvent
OutputDebugStringA
lstrcpynA
SetUnhandledExceptionFilter
lstrcatA
CreateFileA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
IsBadReadPtr
EnterCriticalSection
lstrcpyA
FormatMessageA
user32
CreateWindowExA
RegisterWindowMessageA
GetSysColorBrush
FillRect
DrawTextExA
GrayStringA
CreatePopupMenu
IsMenu
CheckMenuItem
EnableMenuItem
GetMenuItemCount
GetMenuItemID
GetMenuState
GetMenuItemInfoA
GetSubMenu
InsertMenuItemA
ModifyMenuA
LoadMenuA
PtInRect
ReleaseCapture
LoadAcceleratorsA
TranslateAcceleratorA
DestroyMenu
ReuseDDElParam
UnpackDDElParam
SetRectEmpty
GetClipboardFormatNameA
UnregisterClassA
RegisterClipboardFormatA
InflateRect
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
OffsetRect
IntersectRect
CreateDialogIndirectParamA
DestroyWindow
GetDlgCtrlID
GetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
LoadIconA
GetForegroundWindow
GetClassInfoExA
GetWindow
GetTopWindow
GetNextDlgTabItem
GetCapture
SetActiveWindow
GetActiveWindow
ShowOwnedPopups
IsWindowVisible
InvalidateRect
UpdateWindow
GetWindowDC
ClientToScreen
MapWindowPoints
BringWindowToTop
IsIconic
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindowThreadProcessId
GetKeyState
CallNextHookEx
SetWindowsHookExA
ValidateRect
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetFocus
TabbedTextOutA
IsWindow
PostQuitMessage
wsprintfA
PostMessageA
MessageBoxA
SetCursor
GetSystemMetrics
GetDC
SendMessageA
FindWindowA
LoadCursorA
SetFocus
MoveWindow
GetWindowRect
EndPaint
BeginPaint
GetDlgItem
SetWindowPos
EndDialog
ShowWindow
SetWindowTextA
KillTimer
GetCursorPos
SetRect
GetWindowLongA
WinHelpA
TrackPopupMenu
TrackMouseEvent
keybd_event
GetKeyboardState
ClipCursor
GetClassInfoA
RegisterClassA
GetSysColor
EqualRect
DeferWindowPos
BeginDeferWindowPos
SetForegroundWindow
EndDeferWindowPos
GetClassNameA
DrawTextW
GetIconInfo
AdjustWindowRect
SetMenu
GetClassLongA
ChangeDisplaySettingsA
GetWindowPlacement
SetWindowPlacement
EnumDisplaySettingsA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
ScreenToClient
DrawTextA
GetClientRect
GetDesktopWindow
CopyRect
ReleaseDC
AdjustWindowRectEx
GetMenu
SetWindowLongA
SystemParametersInfoA
SetTimer
LoadBitmapA
gdi32
PtVisible
RectVisible
GetPixel
Escape
CreateCompatibleBitmap
CreatePatternBrush
ScaleWindowExtEx
SetWindowExtEx
GetTextExtentPoint32A
SelectObject
CreateFontIndirectA
DeleteObject
CreateFontA
TextOutA
SetTextColor
SetBkMode
GetObjectA
GetDeviceCaps
CreateDIBSection
CreateCompatibleDC
DeleteDC
SetTextAlign
SetBkColor
SetMapMode
BitBlt
ExtTextOutA
GetDIBits
CreateSolidBrush
GetObjectType
GetStockObject
GetClipBox
CreateBitmap
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
RestoreDC
SaveDC
advapi32
OpenThreadToken
RevertToSelf
SetThreadToken
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
shell32
DragFinish
DragQueryFileA
oleaut32
VariantInit
VariantChangeType
VariantClear
shlwapi
PathFindExtensionA
PathFindFileNameA
ws2_32
inet_addr
closesocket
htons
gethostbyname
inet_ntoa
WSASocketA
WSAGetLastError
WSAConnect
WSAStartup
WSAAsyncSelect
WSACleanup
WSARecv
send
imm32
ImmGetContext
ImmGetCompositionStringA
oleacc
LresultFromObject
CreateStdAccessibleObject
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ole32
CoTaskMemFree
StringFromCLSID
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 378KB - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 30.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 387KB - Virtual size: 386KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ