Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_140026e0c815a562e9336c7d984d5e71_icedid.exe
Resource
win7-20240221-en
General
-
Target
2024-04-20_140026e0c815a562e9336c7d984d5e71_icedid
-
Size
1.7MB
-
MD5
140026e0c815a562e9336c7d984d5e71
-
SHA1
ef085433583fef5b8e62d9115c18d14d2447eac9
-
SHA256
7aafd9608ba1e0c38d5c6fc6f76fd3e75ba1652013230656c48445dbb82ba166
-
SHA512
d4566f7774f9f420ee5877d6e457b817a2f9821533fcaf0c89218fdecee3b14f4b420b585b4964fc93a6074fe2493f991e92b988b154d1a31f9ea930318aa3c6
-
SSDEEP
49152:MpzC/QpKk6ncs6IJBeh+kesPHpZf3AT9pHWODqDkB9h9xCYOwoIBEs1:8lKk63JBrgDkB9hfCYdocZ1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-20_140026e0c815a562e9336c7d984d5e71_icedid
Files
-
2024-04-20_140026e0c815a562e9336c7d984d5e71_icedid.exe windows:5 windows x86 arch:x86
e50fd2342adb8ea2f33fb824abeba832
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
RtlUnwind
SetEnvironmentVariableA
SetCurrentDirectoryA
GetSystemTimeAsFileTime
GetDriveTypeA
HeapFree
CreateDirectoryA
RemoveDirectoryA
HeapAlloc
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
SetStdHandle
GetFileType
GetStartupInfoA
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
InterlockedIncrement
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
HeapCreate
VirtualFree
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetExitCodeProcess
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
GetModuleHandleW
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetFileSizeEx
SystemTimeToFileTime
LocalFileTimeToFileTime
WaitForSingleObject
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetCurrentProcessId
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
GetVersionExA
FreeResource
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
LoadLibraryA
GetThreadLocale
MoveFileA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
SetLastError
DeviceIoControl
WriteFile
ReadFile
CreateFileA
GetTickCount
GetPrivateProfileIntA
GetVersion
GetModuleHandleA
GetProcAddress
MultiByteToWideChar
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
lstrlenA
GetFileSize
GetVolumeInformationA
WritePrivateProfileStringA
GetPrivateProfileStringA
DeleteFileA
GetCommandLineA
GetWindowsDirectoryA
SetFileAttributesA
GetFileAttributesA
Sleep
CopyFileA
QueryPerformanceFrequency
QueryPerformanceCounter
CreateProcessA
CloseHandle
GetLastError
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
SetUnhandledExceptionFilter
FindResourceA
user32
RegisterClipboardFormatA
PostThreadMessageA
LoadCursorA
GetSysColorBrush
UnregisterClassA
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
CheckMenuItem
SendDlgItemMessageA
WinHelpA
IsChild
SetWindowsHookExA
CallNextHookEx
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextA
GetLastActivePopup
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
OffsetRect
SendMessageA
GetFocus
EnableWindow
SetTimer
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetMenuState
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
GetClassLongA
SetCapture
KillTimer
SetForegroundWindow
GetForegroundWindow
RegisterWindowMessageA
UpdateWindow
InvalidateRect
SendMessageTimeoutA
GetSysColor
PostMessageA
RedrawWindow
LoadIconA
GetWindowRect
keybd_event
GetWindowLongA
IsWindowVisible
GetWindow
EnableMenuItem
DrawMenuBar
GetSystemMenu
GetKeyState
SetCursor
PeekMessageA
GetClientRect
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
IsWindow
GetClassNameA
UnhookWindowsHookEx
GetSystemMetrics
CharUpperA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetCapture
gdi32
ExtSelectClipRgn
DeleteDC
GetStockObject
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetWindowExtEx
GetViewportExtEx
SetBkColor
SelectClipRgn
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
GetClipBox
GetDeviceCaps
BitBlt
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateCompatibleDC
CreateCompatibleBitmap
CreateRectRgn
CreateFontIndirectA
CreateSolidBrush
SetTextColor
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
GetFileSecurityA
SetFileSecurityA
GetCurrentHwProfileA
shell32
SHFileOperationA
shlwapi
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
oledlg
ord8
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleIsCurrentClipboard
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 199KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 51KB - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE