Static task
static1
Behavioral task
behavioral1
Sample
2024-05-04_37bd84cb9018831f2171b4d8e067abeb_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-04_37bd84cb9018831f2171b4d8e067abeb_icedid.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-04_37bd84cb9018831f2171b4d8e067abeb_icedid
-
Size
264KB
-
MD5
37bd84cb9018831f2171b4d8e067abeb
-
SHA1
896ebe241d20aad60248cdf2fb3792abea1c32e7
-
SHA256
95a2b69b54a97e972a9b5d97e37eb53aa70fef68b842bb5bd54bf775a4170caf
-
SHA512
464144e1c3d82beafc187a78489ec714f89dd94b7418863ca0d59f8df884eafdb5ba3f496aaa73dda6b9c37a89368e4300d2fcf9d1e9c3c22e5f1cc56bb32cbe
-
SSDEEP
6144:an5HGOBBYfl/31r3acSSPICS/yxP12g7PUe:an5G1tPVE012g75
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-04_37bd84cb9018831f2171b4d8e067abeb_icedid
Files
-
2024-05-04_37bd84cb9018831f2171b4d8e067abeb_icedid.exe windows:4 windows x86 arch:x86
534611689f32b85ccd2ef7280a71d4b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeSetEvent
timeGetTime
kernel32
FlushFileBuffers
GetCurrentProcess
RtlUnwind
ExitThread
CreateThread
HeapAlloc
HeapFree
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
ExitProcess
HeapSize
TerminateProcess
SetFilePointer
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetThreadLocale
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
GetCurrentProcessId
WaitForSingleObject
FormatMessageA
LocalFree
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalAlloc
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
lstrlenA
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
GetFileSize
SetErrorMode
SetupComm
SetCommTimeouts
CreateFileA
GetCommState
EscapeCommFunction
SetCommMask
CreateEventA
ClearCommError
ReadFile
Sleep
WriteFile
SetCommState
PurgeComm
GetLastError
VirtualAlloc
SetThreadPriority
MulDiv
CloseHandle
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
VirtualFree
GetDiskFreeSpaceA
LoadLibraryA
GetProcAddress
FreeLibrary
GetVersionExA
UnhandledExceptionFilter
user32
UnregisterClassA
DestroyMenu
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
LoadCursorA
GetSysColorBrush
RegisterWindowMessageA
GetWindowRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
PostMessageA
GetSystemMetrics
LoadIconA
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
EnableWindow
GetTopWindow
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ScaleViewportExtEx
DeleteObject
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
CreateFontIndirectA
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 180KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ