Behavioral task
behavioral1
Sample
2024-04-16_c48c6d587d476182a39fac7ebd7e6ed0_icedid.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-16_c48c6d587d476182a39fac7ebd7e6ed0_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_c48c6d587d476182a39fac7ebd7e6ed0_icedid
-
Size
1.7MB
-
MD5
c48c6d587d476182a39fac7ebd7e6ed0
-
SHA1
8db46501df047be23a67e2ef5cbea8542ae02709
-
SHA256
d2a635e2ead4d9d27e54101763cd06d5f560219c098eb7061a94d42f5524d073
-
SHA512
a7a0f6102df5efd5f4e3441c27ca639885af08c868a2dd13241fd20ef47f6cb424643277e5cf0a7464604ba6beebcd0436b52019c1ffd833bb4a302f094ed264
-
SSDEEP
24576:iFTdGc7V01uI5yzRIIvs7fTFuKiUR5Z3F6XYqxB8fuTVlxxE59+dYJd5iBZd/pI:iCS01uIfZj3Fh4+2TPxeJ8RI
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-16_c48c6d587d476182a39fac7ebd7e6ed0_icedid
Files
-
2024-04-16_c48c6d587d476182a39fac7ebd7e6ed0_icedid.exe windows:4 windows x86 arch:x86
a62ff9824cf074f23822e5f99ba68b5e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
SetFileAttributesA
WriteFile
DeleteFileA
LCMapStringA
FindClose
FindFirstFileA
FindNextFileA
GetModuleFileNameA
WritePrivateProfileStringA
GetPrivateProfileStringA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
MultiByteToWideChar
CreateThread
WideCharToMultiByte
lstrlenW
GetTickCount
CloseHandle
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrlenA
Sleep
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetLastError
GetCurrentProcess
MulDiv
lstrcatA
lstrcpyA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
LocalAlloc
LocalFree
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
lstrcpynA
GlobalFlags
InterlockedDecrement
InterlockedIncrement
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
SetErrorMode
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
RtlUnwind
TerminateProcess
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
IsDebuggerPresent
CreateEventA
OpenEventA
CreateMutexA
SetWaitableTimer
CreateWaitableTimerA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetCurrentProcessId
OpenFileMappingA
VirtualFree
VirtualAlloc
Process32Next
Process32First
CreateFileA
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
Module32Next
CreateToolhelp32Snapshot
GetFileAttributesA
GetTempPathA
VirtualProtect
user32
UnhookWindowsHookEx
GetMenuItemCount
ReleaseDC
TabbedTextOutA
DrawTextA
GrayStringA
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
ClientToScreen
GetDlgCtrlID
GetClientRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
UnregisterHotKey
SetCapture
ReleaseCapture
RegisterHotKey
LoadBitmapA
PtInRect
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
IsWindowVisible
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
CreateWindowStationA
GetSysColor
GetDC
CreateWindowExA
CallWindowProcA
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
EnableWindow
GetWindow
FindWindowExA
GetParent
GetWindowTextLengthW
GetWindowTextW
GetWindowInfo
FindWindowA
SetLayeredWindowAttributes
GetCursorPos
GetAsyncKeyState
mouse_event
IsWindow
MessageBoxA
wsprintfA
GetWindowTextLengthA
GetWindowLongA
SetWindowPos
ScreenToClient
GetWindowRect
SetWindowLongA
ShowWindow
GetDlgItem
CopyRect
GetKeyState
GetSystemMetrics
PeekMessageA
OpenClipboard
EmptyClipboard
CloseClipboard
CreateDialogIndirectParamA
UpdateWindow
GetMessageA
SendMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
SetWindowTextA
UnregisterClassA
shell32
ShellExecuteA
DragQueryFileA
DragFinish
DragAcceptFiles
SHGetSpecialFolderPathA
gdi32
DeleteObject
GetDeviceCaps
TranslateCharsetInfo
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
GetStockObject
GetObjectA
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateFontA
ws2_32
recv
getsockname
ntohs
htons
send
WSACleanup
socket
closesocket
gethostbyname
connect
select
inet_addr
WSAAsyncSelect
WSAStartup
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
shlwapi
PathFileExistsA
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
comctl32
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_EndDrag
ord17
ImageList_BeginDrag
Sections
.text Size: 376KB - Virtual size: 374KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ