Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_5d3b846151ee0a610c3ce26f9016dfbc_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_5d3b846151ee0a610c3ce26f9016dfbc_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-17_5d3b846151ee0a610c3ce26f9016dfbc_icedid
-
Size
887KB
-
MD5
5d3b846151ee0a610c3ce26f9016dfbc
-
SHA1
9f9757187336f8226c1ccdd77c89a40e81e019a7
-
SHA256
91103d73a5e33bb44ebc37233d6f79b4056bc867589f29a7d06449beb67f94a7
-
SHA512
dfa108283a8b7d401a45d16b38fa21b6b2c167cf74f1dd5106fda4ea84d5aad5b14bf47d15da43ad044f5ab456f2129d958f0d3277abc9c7926de15e1c97eb2d
-
SSDEEP
12288:0hK3HH3FDBgcDUL3GL65usXw1Cgh8rmqfG8B1vmRgoKeE7CkG69uAWNa/+:LHHARqYnUCdfG8BMRgoR2RBp/+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-17_5d3b846151ee0a610c3ce26f9016dfbc_icedid
Files
-
2024-04-17_5d3b846151ee0a610c3ce26f9016dfbc_icedid.exe windows:5 windows x86 arch:x86
292b2e7845f14cc72065ef609ef284b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
pxmewuserif
ord343
ord342
ord344
kernel32
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetTickCount
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
GetStartupInfoA
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
DuplicateHandle
IsDebuggerPresent
GetTimeZoneInformation
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
lstrcmpiA
GetStringTypeExA
GetCurrentDirectoryA
FileTimeToSystemTime
GetThreadLocale
GetOEMCP
GetCPInfo
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetModuleHandleW
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
LoadLibraryExA
InterlockedExchange
lstrcmpA
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
GetCurrentProcessId
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
LoadLibraryA
lstrcmpW
GetModuleHandleA
GetProcAddress
GetVersionExA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
MulDiv
lstrlenA
WideCharToMultiByte
GetLastError
SetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
GetCommandLineA
CreateFileA
GetCommState
SetCommState
GetCommTimeouts
SetCommTimeouts
CloseHandle
ExitThread
ReadFile
ClearCommError
WriteFile
QueryPerformanceFrequency
QueryPerformanceCounter
GetProcessHeap
HeapAlloc
HeapFree
Sleep
SetUnhandledExceptionFilter
user32
DeleteMenu
CharUpperA
CharNextA
CopyAcceleratorTableA
SetRect
InvalidateRgn
SetCapture
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
GetDC
ReleaseDC
GetSysColorBrush
ClientToScreen
GetMenuItemInfoA
InflateRect
ShowOwnedPopups
SetWindowContextHelpId
MapDialogRect
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
PostQuitMessage
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
GetWindowThreadProcessId
IsWindowEnabled
SetCursor
ReleaseCapture
LoadAcceleratorsA
IsRectEmpty
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
GetDesktopWindow
ShowWindow
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
PostMessageA
MessageBoxA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
ScreenToClient
EqualRect
DeferWindowPos
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
OffsetRect
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
InvalidateRect
LoadCursorA
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
GetMenuState
GetMenuStringA
InsertMenuA
AdjustWindowRectEx
SetWindowPos
GetClientRect
GetWindowLongA
SetWindowLongA
IsWindow
TranslateAcceleratorA
TranslateMDISysAccel
BringWindowToTop
GetActiveWindow
DrawMenuBar
CreateWindowExA
GetParent
GetMenuItemCount
GetSubMenu
GetMenuItemID
SendMessageA
GetMenu
DefFrameProcA
EnableWindow
UpdateWindow
wsprintfA
KillTimer
SetTimer
SetFocus
gdi32
ExtSelectClipRgn
RectVisible
DeleteDC
CreatePatternBrush
GetStockObject
CreateSolidBrush
SetWindowExtEx
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
PtVisible
GetPixel
GetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetDeviceCaps
GetViewportExtEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
DeleteObject
GetTextExtentPoint32A
ExtTextOutA
BitBlt
CreateFontIndirectA
CreateBitmap
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
TextOutA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
DragFinish
DragQueryFileA
shlwapi
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemFree
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantClear
VariantCopy
SysAllocStringByteLen
SysFreeString
SysStringLen
SysAllocStringLen
VariantInit
VariantChangeType
bcrypt
BCryptCloseAlgorithmProvider
BCryptGenerateSymmetricKey
BCryptGetProperty
BCryptSetProperty
BCryptOpenAlgorithmProvider
BCryptDecrypt
BCryptDestroyKey
BCryptEncrypt
Sections
.text Size: 599KB - Virtual size: 599KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 36.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE