Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_7c4d6ec2c11879ecf8fd1228da1e51d2_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-15_7c4d6ec2c11879ecf8fd1228da1e51d2_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_7c4d6ec2c11879ecf8fd1228da1e51d2_icedid
-
Size
446KB
-
MD5
7c4d6ec2c11879ecf8fd1228da1e51d2
-
SHA1
0118dd6a96a36ca1f223bdaea50ed5cbefa543fb
-
SHA256
791c670e23ce060af56537109c04fb22ce9bb45588b8c6ab7e36d542faa3d8eb
-
SHA512
2f6baa7b286507890d68ca0e4a8820e27f9576650dad00189aebdf1f806114da0105489ff5b1ae40026a0f6a827b6a93d125673186d3c4007b196b13fb89007e
-
SSDEEP
6144:QdACK/KT5JJgvGdGSgXlZ7qL8bb/w12OBPV6PqxjAoXut3KLl/4mRBM:udyGClZ7qLaDwDyPwMWO3Yl/4mRBM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-15_7c4d6ec2c11879ecf8fd1228da1e51d2_icedid
Files
-
2024-04-15_7c4d6ec2c11879ecf8fd1228da1e51d2_icedid.exe windows:4 windows x86 arch:x86
b1655bc5ef78b3c212fdc6a9beafac1e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
fudrvutl
EPFDRVUTL_CancelAllJobs
EPFDRVUTL_GetDeviceName
EPFDRVUTL_CreateDriverList
EPFDRVUTL_GetDeviceCount
EPFDRVUTL_GetDevNames
EPFDRVUTL_DeleteDriverList
kernel32
GetFileAttributesW
GetFileTime
GetTickCount
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
ExitThread
CreateThread
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GlobalFree
GlobalAlloc
GetLastError
WaitForSingleObject
CloseHandle
CreateProcessW
lstrcatW
lstrcpyW
lstrlenW
GetLogicalDrives
lstrcmpW
lstrcmpA
lstrlenA
FindClose
lstrcpyA
FindNextFileW
FindFirstFileW
GetModuleFileNameW
LoadLibraryW
SetCurrentDirectoryW
lstrcmpiW
GetCurrentDirectoryW
lstrcpynW
SetLastError
FileTimeToLocalFileTime
SetErrorMode
CreateFileW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringW
FileTimeToSystemTime
GetThreadLocale
GlobalFlags
TlsFree
LoadLibraryExW
Sleep
SizeofResource
LockResource
LoadResource
FindResourceW
IsBadReadPtr
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
SetEvent
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GetModuleHandleW
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetModuleHandleA
SuspendThread
ResumeThread
SetThreadPriority
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
FreeResource
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
GetVersionExA
GetCurrentProcessId
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
MulDiv
GetUserDefaultLangID
InterlockedIncrement
InterlockedDecrement
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
CreateEventW
GetProcAddress
GetConsoleMode
user32
DestroyMenu
UnregisterClassW
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetWindowContextHelpId
MapDialogRect
ReleaseDC
GetDC
GetDesktopWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
GetMessageW
GetActiveWindow
GetCursorPos
ValidateRect
PostQuitMessage
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
IsWindow
SetFocus
CharNextW
GetForegroundWindow
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
IsWindowVisible
UpdateWindow
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
ModifyMenuW
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
GetMenuState
PostThreadMessageW
RegisterClipboardFormatW
MessageBeep
GetNextDlgGroupItem
ReleaseCapture
SetCapture
InvalidateRgn
SetRect
IsRectEmpty
GetWindowTextW
CopyAcceleratorTableW
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
CloseWindow
LoadIconW
LoadCursorW
InvalidateRect
GetClientRect
IsIconic
SendMessageW
DrawIcon
AttachThreadInput
PeekMessageW
SetCursor
TranslateMessage
DispatchMessageW
wvsprintfW
EnableWindow
MessageBoxW
wsprintfW
CharUpperW
PostMessageW
SetForegroundWindow
UnregisterClassA
gdi32
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetMapMode
RestoreDC
SaveDC
CreateRectRgnIndirect
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SetWindowExtEx
GetDeviceCaps
comdlg32
GetFileTitleW
winspool.drv
ord203
DeletePrinter
ClosePrinter
OpenPrinterW
DeletePrinterDriverExW
GetPrinterDriverDirectoryW
ord204
DocumentPropertiesW
GetPrinterW
advapi32
AllocateAndInitializeSid
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
CloseServiceHandle
RegQueryValueW
RegEnumKeyW
RegOpenKeyW
OpenThreadToken
OpenProcessToken
GetTokenInformation
RegCloseKey
EqualSid
FreeSid
RegDeleteKeyW
shell32
SHGetSpecialFolderLocation
DoEnvironmentSubstW
SHGetPathFromIDListW
comctl32
ord17
shlwapi
PathFindExtensionW
PathStripToRootW
PathFindFileNameW
PathIsUNCW
oledlg
OleUIBusyW
ole32
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CreateILockBytesOnHGlobal
CoTaskMemAlloc
CoTaskMemFree
CoGetMalloc
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysFreeString
SysStringLen
Sections
.text Size: 224KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE