Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_1f01bd59ebd3cc4f035038538f7fe76f_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_1f01bd59ebd3cc4f035038538f7fe76f_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_1f01bd59ebd3cc4f035038538f7fe76f_icedid
-
Size
320KB
-
MD5
1f01bd59ebd3cc4f035038538f7fe76f
-
SHA1
a7ad6def40d11a72456d1bf900e7e3a78169a7fb
-
SHA256
a0f88af9526b0f02cee0aa9cdaa4c5bac5be22940a4e0b19bc7330536db57c55
-
SHA512
a9294e4b30ef9d1d80068fc35b06e99f460537855eaf4093530147097fb41a3b154d1cd90c16c2e83971e4cd289cc9ebd8627e58178d44c411bc0bc8ab5b773a
-
SSDEEP
6144:VplMzZZNaBzz/Ak+KZ0fBL0ntRJFQtiBMUrK/a:pgnaBX/VtZ0fFkGsG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-16_1f01bd59ebd3cc4f035038538f7fe76f_icedid
Files
-
2024-04-16_1f01bd59ebd3cc4f035038538f7fe76f_icedid.exe windows:4 windows x86 arch:x86
813896663692c8ca4270411a272b399c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeKillEvent
timeSetEvent
reesdata
??1CReesData@@QAE@XZ
?elaptens@@YAJPAJ@Z
?BackupDatabase@CReesData@@QAE_NPBD0@Z
?RestoreDatabase@CReesData@@QAE_NPBD0_N1@Z
?geterrors@CReesData@@QAEPBDXZ
?maketime@@YAXPADPAUclock@@PAUparmhead@@_N@Z
?calcraw@@YAXJPAUclock@@@Z
?Decryptpw@CReesData@@QAEPBDPBD@Z
?exepath@@3PADA
?getfilelocations@@YAXD@Z
?timetobuf@@YAXPADGPAUparmhead@@_N@Z
?Encryptpw@CReesData@@QAEPBDPBD@Z
?getpctime@@YAKPAUclock@@_N@Z
?OpenDB@CReesData@@QAE_N_NPBD@Z
?SetDatabaseType@CReesData@@QAEX_N@Z
?reesini@@3PADA
??0CReesData@@QAE@XZ
?cstrtotime@@YAFAAV?$CStringT@DV?$StrTraitMFC@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@PAGPAUparmhead@@_N@Z
?timetocstr@@YAXAAV?$CStringT@DV?$StrTraitMFC@DV?$ChTraitsCRT@D@ATL@@@@@ATL@@GPAUparmhead@@_N@Z
?gettime@@YAXPAJ@Z
kernel32
TlsFree
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
TerminateProcess
LocalReAlloc
SetEnvironmentVariableA
GetDriveTypeA
CreateDirectoryA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedIncrement
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
GetFileTime
GetFileSize
GetFileAttributesA
SetFileAttributesA
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
GlobalAddAtomA
InterlockedDecrement
FreeResource
SetLastError
GlobalFree
MulDiv
GlobalUnlock
lstrcpynA
LocalFree
GetCurrentThread
GlobalLock
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
GetModuleFileNameA
GetCurrentThreadId
OutputDebugStringA
GetComputerNameA
GetDiskFreeSpaceExA
SetCurrentDirectoryA
GetWindowsDirectoryA
FormatMessageA
GetCurrentDirectoryA
CreateThread
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
Sleep
CreateFileA
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
FindNextFileA
user32
TranslateAcceleratorA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
FillRect
wsprintfA
ReleaseDC
GetDC
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
PtInRect
GetSysColor
SystemParametersInfoA
DestroyMenu
GetMenuItemInfoA
InflateRect
CopyRect
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
IsWindowVisible
GetKeyState
ValidateRect
MessageBoxA
GetLastActivePopup
SetMenu
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetNextDlgTabItem
EndDialog
UnhookWindowsHookEx
SetWindowContextHelpId
MapDialogRect
GetWindowTextLengthA
GetWindowTextA
GetFocus
GetParent
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
GetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetDlgItem
GetWindow
GetMenuState
GetMenuItemCount
PostQuitMessage
SetMenuDefaultItem
GetCursorPos
TrackPopupMenu
LoadMenuA
GetSubMenu
GetMenuItemID
PostMessageA
GetDesktopWindow
DrawTextA
RegisterWindowMessageA
SetForegroundWindow
PeekMessageA
DispatchMessageA
TranslateMessage
GetSystemMetrics
EnableWindow
LoadIconA
KillTimer
SetTimer
BringWindowToTop
SetRectEmpty
CreatePopupMenu
InsertMenuItemA
SetParent
PostThreadMessageA
LockWindowUpdate
GetDCEx
GetClientRect
GetWindowRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
OffsetRect
UnregisterClassA
UpdateWindow
CharUpperA
RegisterClipboardFormatA
ShowOwnedPopups
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
GetSysColorBrush
LoadCursorA
WindowFromPoint
SetCapture
IsZoomed
UnpackDDElParam
ReuseDDElParam
ReleaseCapture
LoadAcceleratorsA
SetCursor
InvalidateRect
ModifyMenuA
gdi32
DeleteDC
CreatePatternBrush
GetWindowExtEx
GetStockObject
CreateSolidBrush
CreateCompatibleBitmap
GetTextMetricsA
GetBkColor
GetTextColor
GetRgnBox
SetRectRgn
CombineRgn
GetMapMode
ExtSelectClipRgn
GetViewportExtEx
CreateRectRgn
SelectClipRgn
DeleteObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
PatBlt
CreateRectRgnIndirect
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
ExtTextOutA
BitBlt
CreateFontIndirectA
GetObjectA
CreateBitmap
GetDeviceCaps
CreateCompatibleDC
IntersectClipRect
GetPixel
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegisterServiceCtrlHandlerA
ImpersonateLoggedOnUser
LogonUserA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegDeleteValueA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
StartServiceCtrlDispatcherA
RevertToSelf
SetServiceStatus
DeleteService
CreateServiceA
RegCreateKeyA
DeregisterEventSource
RegisterEventSourceA
ReportEventA
ControlService
StartServiceA
QueryServiceStatus
shell32
DragQueryFileA
SHBrowseForFolderA
SHGetMalloc
Shell_NotifyIconA
SHGetPathFromIDListA
DragFinish
comctl32
ord17
ImageList_Destroy
ImageList_Draw
ImageList_GetImageInfo
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
oleaut32
SysFreeString
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
OleCreateFontIndirect
SysAllocString
SysAllocStringByteLen
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
Sections
.text Size: 216KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ