Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_aacb7df0983ad5c456c4f87eb5b0cc3a_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_aacb7df0983ad5c456c4f87eb5b0cc3a_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-23_aacb7df0983ad5c456c4f87eb5b0cc3a_icedid
-
Size
950KB
-
MD5
aacb7df0983ad5c456c4f87eb5b0cc3a
-
SHA1
7dc275c2d0846dfd1823f8075ee33ccec3ee9670
-
SHA256
6108806031c8a50b0599be6752adae4c7976a8cf05f5d124d1450d82f82ccd5c
-
SHA512
032eb91943100b6df6ddf03eb0ec482de067d5060b74ef2092cd92966df265548313362c8b449e0017133603fb9a51b0737c56f3a75af36a1e1f2f8333a1bbc6
-
SSDEEP
12288:PzxpGmEPt51FuwiYFE+eDTrcto0ihjmN35+jLf3zWjcDZpbJ32yao15:Pz/GRPj1FW3rcto0yCu3OcH15
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-23_aacb7df0983ad5c456c4f87eb5b0cc3a_icedid
Files
-
2024-04-23_aacb7df0983ad5c456c4f87eb5b0cc3a_icedid.exe windows:5 windows x86 arch:x86
eb29776e984d865f133621a23017e873
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
oleaut32
VariantInit
VariantChangeType
VariantClear
SystemTimeToVariantTime
VariantTimeToSystemTime
VarDateFromStr
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
GetOEMCP
ReadFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetFullPathNameA
GetFileSizeEx
SetErrorMode
RtlUnwind
UnhandledExceptionFilter
ExitProcess
HeapFree
HeapAlloc
IsDebuggerPresent
RaiseException
VirtualProtect
VirtualAlloc
SetStdHandle
GetFileType
GetSystemTimeAsFileTime
GetStartupInfoA
HeapReAlloc
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStringTypeA
GetStringTypeW
GetCPInfo
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GlobalFlags
lstrlenA
lstrcpyA
FreeLibrary
FormatMessageA
LoadLibraryA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CloseHandle
lstrcatA
LoadLibraryExA
SetLastError
GetModuleFileNameA
CompareStringA
WaitForSingleObject
CreateProcessA
SizeofResource
LockResource
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedIncrement
GetModuleHandleW
FileTimeToLocalFileTime
FileTimeToSystemTime
ConvertDefaultLocale
EnumResourceLanguagesA
InterlockedExchange
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetCurrentProcessId
InterlockedDecrement
GetModuleFileNameW
GetProcessHeap
VirtualQuery
GlobalMemoryStatus
GetSystemInfo
GetLocaleInfoA
IsBadReadPtr
SetUnhandledExceptionFilter
TerminateProcess
WriteFile
GetTimeZoneInformation
GetTickCount
LoadResource
FindResourceA
GetVersionExA
ExpandEnvironmentStringsA
Sleep
LocalAlloc
GetFileTime
LocalFree
SetFileTime
CompareFileTime
FreeResource
DeviceIoControl
GetTempFileNameA
GetTempPathA
GetDriveTypeA
RemoveDirectoryA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFileAttributesA
GetFileAttributesA
GetSystemDirectoryA
GetWindowsDirectoryA
CreateDirectoryA
lstrcmpA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentThread
lstrcpyW
ReadProcessMemory
WriteProcessMemory
MulDiv
GetVolumeInformationA
CreateFileA
GetFileSize
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringA
InitializeCriticalSection
WritePrivateProfileStringA
GetPrivateProfileStringA
GetLocalTime
lstrcpynA
GetCommandLineA
HeapCreate
user32
ValidateRect
DestroyMenu
ShowWindow
MoveWindow
IsDialogMessageA
IsDlgButtonChecked
GetDlgItemTextA
CheckDlgButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
GetWindowPlacement
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
GetKeyState
EndPaint
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
IsWindowEnabled
GetWindowTextLengthA
GetWindowTextA
SetFocus
UnhookWindowsHookEx
GetMenuState
GetActiveWindow
DialogBoxParamA
SetDlgItemTextA
SetWindowTextA
EndDialog
SetWindowLongA
LockWindowUpdate
GetClipboardData
OemToCharBuffA
GetFocus
PeekMessageA
PostQuitMessage
GetDC
SetRect
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
DrawFocusRect
DrawFrameControl
DrawStateA
DrawIconEx
SystemParametersInfoA
GetSubMenu
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
DrawEdge
InflateRect
CopyRect
KillTimer
SetTimer
FillRect
OffsetRect
MapVirtualKeyA
GetKeyNameTextA
GetCursorPos
GetSysColor
LoadAcceleratorsA
TranslateAcceleratorA
CreatePopupMenu
GetWindowLongA
GetClassNameA
WindowFromPoint
ScreenToClient
ChildWindowFromPointEx
GetParent
IsWindowVisible
PtInRect
SetWindowPos
ReleaseCapture
SetCursor
LoadImageA
SetForegroundWindow
GetWindow
ChildWindowFromPoint
SetCapture
ClientToScreen
GetClientRect
CharUpperA
UnregisterClassA
GetSysColorBrush
GetMessageA
GetLastActivePopup
TranslateMessage
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
IsWindow
GetWindowRect
GetWindowDC
GetSystemMetrics
ReleaseDC
DestroyIcon
DestroyCursor
MessageBeep
MessageBoxA
GetWindowThreadProcessId
IsCharAlphaNumericA
wsprintfA
InvalidateRect
UpdateWindow
PostMessageA
GetDlgItem
LoadBitmapA
LoadCursorA
EnableWindow
LoadIconA
SendMessageA
RedrawWindow
RegisterWindowMessageA
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
DPtoLP
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
GetTextExtentPoint32A
PatBlt
GetTextColor
CreateBitmap
CreateFontA
CreateDIBitmap
GetViewportOrgEx
SetViewportOrgEx
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontIndirectA
GetObjectA
SetROP2
CreatePen
SelectObject
GetStockObject
Rectangle
DeleteObject
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegQueryValueA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryInfoKeyA
RegDeleteValueA
RegFlushKey
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
OpenThreadToken
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
shell32
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
shlwapi
PathFindExtensionA
PathRemoveFileSpecW
UrlUnescapeA
PathStripToRootA
PathFindFileNameA
PathIsUNCA
wininet
InternetOpenUrlA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetQueryDataAvailable
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
comdlg32
GetFileTitleA
Sections
.text Size: 369KB - Virtual size: 369KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 461KB - Virtual size: 460KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ