Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_cc94d4e741daf45e3955db6244915f6b_floxif_icedid.exe
Resource
win7-20240215-en
General
-
Target
2024-05-14_cc94d4e741daf45e3955db6244915f6b_floxif_icedid
-
Size
3.9MB
-
MD5
cc94d4e741daf45e3955db6244915f6b
-
SHA1
60a3d4ac86f7a80cbea21645063d2fa06bb52ebc
-
SHA256
80f6330fb12ab444181cf567965a29435753bbe09f90617766e7449bd80ebce7
-
SHA512
974cde26785700c40445fcabcd678d935a60ebf5c9ee42c60f751128d775d36a4030d693fbcc90647824018f58d0c7584430bb311f863975efe864cc90750e2d
-
SSDEEP
49152:3lrytcnhHSCtyzqhQvW/hAjVYGm5oM1N3KkdEh4KUPPzlJ17n8Tiv:3lrIRC0zyh2YGm5L1N3R84PPP5Pb8Ts
Malware Config
Signatures
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-14_cc94d4e741daf45e3955db6244915f6b_floxif_icedid
Files
-
2024-05-14_cc94d4e741daf45e3955db6244915f6b_floxif_icedid.exe windows:4 windows x86 arch:x86
84911948e6ce6391a73dacc951bad2d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
closesocket
socket
ioctlsocket
connect
gethostbyname
inet_addr
htons
send
recv
__WSAFDIsSet
select
getsockopt
listen
bind
accept
getsockname
ntohs
WSASetLastError
WSAStartup
WSACleanup
htonl
ntohl
WSAGetLastError
kernel32
GlobalFlags
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GetCPInfo
GetOEMCP
GetFileTime
SetErrorMode
WritePrivateProfileStringA
FindResourceExA
RtlUnwind
GetTimeZoneInformation
GetLocalTime
GetSystemTimeAsFileTime
VirtualProtect
HeapReAlloc
SetEnvironmentVariableW
GetCurrentDirectoryW
SetCurrentDirectoryW
RemoveDirectoryA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetStartupInfoA
GetCommandLineA
GetACP
ExitThread
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
SetStdHandle
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
lstrlenW
GetCurrentThread
GetTickCount
GetProfileIntA
GetThreadLocale
GetFullPathNameA
FindFirstFileA
UnlockFile
LockFile
DuplicateHandle
lstrcmpA
SuspendThread
SetThreadPriority
ResumeThread
FileTimeToLocalFileTime
InterlockedIncrement
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
CreateProcessA
RemoveDirectoryW
SetThreadExecutionState
GetVolumeInformationW
CompareFileTime
GetDiskFreeSpaceW
GetDiskFreeSpaceA
GetSystemInfo
InterlockedDecrement
GetComputerNameA
FindResourceA
SizeofResource
LoadResource
LockResource
GetCurrentDirectoryA
GetSystemDefaultLangID
GetVolumeInformationA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
lstrcpynA
CreateThread
SleepEx
ReadFile
CreateDirectoryA
CopyFileW
MoveFileA
LocalAlloc
SetLastError
CreateDirectoryW
GetFileAttributesExW
FileTimeToSystemTime
CreateWaitableTimerA
SetWaitableTimer
CancelWaitableTimer
SetFileAttributesW
FlushFileBuffers
DeviceIoControl
GetCurrentThreadId
TerminateProcess
GetUserDefaultLangID
SetEvent
lstrlenA
SetFileAttributesA
DeleteFileA
GetWindowsDirectoryW
lstrcmpiA
GetLocaleInfoA
GetDriveTypeW
GetVersion
GetCurrentProcessId
MoveFileW
GetSystemTime
SystemTimeToFileTime
SetFileTime
LoadLibraryW
MoveFileExW
GlobalAlloc
GlobalFree
GetModuleHandleA
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
OpenProcess
lstrcatA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
SetEndOfFile
GetSystemDirectoryW
DeleteFileW
GetWindowsDirectoryA
GetVersionExA
GetExitCodeProcess
CreateFileA
GetCurrentProcess
CreateProcessW
GetModuleFileNameW
CreateEventA
WaitForMultipleObjects
ResetEvent
FindFirstFileW
FindNextFileW
FindClose
CreateFileW
CreateMutexA
OpenMutexA
WaitForSingleObject
ReleaseMutex
CloseHandle
GetSystemDirectoryA
GetModuleFileNameA
GetFileAttributesA
CopyFileA
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
GlobalSize
GlobalLock
GlobalUnlock
WideCharToMultiByte
GetFileAttributesW
GetLastError
FormatMessageA
LocalFree
MultiByteToWideChar
MulDiv
ExitProcess
GetProfileStringA
RaiseException
user32
GetDCEx
LockWindowUpdate
InflateRect
CharUpperA
IsClipboardFormatAvailable
ValidateRect
GrayStringA
DrawTextA
TabbedTextOutA
GetMenuCheckMarkDimensions
GetMenuState
SetMenuItemBitmaps
IsDialogMessageA
GetDlgItemTextA
SendDlgItemMessageA
MapWindowPoints
GetFocus
AdjustWindowRectEx
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
IsChild
WinHelpA
GetClassInfoA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
UnhookWindowsHookEx
CallWindowProcA
GetMessageTime
GetLastActivePopup
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
GetParent
IsWindowEnabled
GetActiveWindow
DrawTextW
DrawFrameControl
SetRect
SystemParametersInfoW
DrawStateA
ModifyMenuW
DeleteMenu
AppendMenuW
DrawIconEx
GetSysColorBrush
FillRect
FrameRect
PeekMessageA
UnionRect
ClientToScreen
WindowFromPoint
SetDlgItemTextA
GetClassNameA
GetWindowTextLengthW
GetWindowTextLengthA
CopyIcon
SetFocus
DestroyIcon
PostQuitMessage
GetMessageA
TranslateMessage
DispatchMessageA
UpdateWindow
SetCursorPos
CreateDialogParamW
CreateDialogParamA
GetPropA
RemovePropA
DefWindowProcW
DefWindowProcA
CreateWindowExA
SetWindowLongA
RegisterClassA
DefDlgProcA
DestroyWindow
GetWindowLongA
GetWindowDC
BeginPaint
EndPaint
SetDlgItemTextW
RegisterWindowMessageA
RegisterClipboardFormatA
RemoveMenu
DrawFocusRect
GetMessagePos
ScreenToClient
LoadCursorA
SetCursor
EqualRect
GetCapture
ReleaseCapture
SetCapture
CreatePopupMenu
GetKeyState
ModifyMenuA
TrackPopupMenu
IsIconic
GetSystemMetrics
DrawIcon
OffsetRect
EnableMenuItem
SetClipboardViewer
CheckMenuItem
LoadImageW
LoadImageA
DestroyMenu
ChangeClipboardChain
GetMenu
EnumWindows
SetForegroundWindow
IsWindowVisible
wsprintfW
ShowWindow
SendMessageW
LoadBitmapA
IsWindow
GetNextDlgGroupItem
CopyAcceleratorTableA
CharNextA
PostThreadMessageA
GetAsyncKeyState
SetRectEmpty
MapDialogRect
SetWindowContextHelpId
IntersectRect
IsRectEmpty
GetMenuItemCount
GetMenuItemID
GetSubMenu
AppendMenuA
CheckMenuRadioItem
GetCursorPos
PtInRect
InvalidateRect
GetClientRect
ReleaseDC
CopyRect
FindWindowA
GetWindowThreadProcessId
MsgWaitForMultipleObjects
MoveWindow
SetParent
KillTimer
SetTimer
wsprintfA
PostMessageA
GetForegroundWindow
ExitWindowsEx
MessageBeep
GetWindowTextA
MessageBoxW
GetWindowTextW
GetWindowRect
CreateWindowExW
SetWindowPos
SetWindowTextW
SetWindowTextA
GetDesktopWindow
MessageBoxA
GetDlgItem
GetSysColor
GetDlgCtrlID
LoadStringA
SendMessageA
GetWindow
GetDC
EnableWindow
LoadIconA
IsWindowUnicode
ExcludeUpdateRgn
ShowCaret
HideCaret
UnregisterClassA
SetPropA
gdi32
ExcludeClipRect
GetBkColor
EnumFontFamiliesExA
GetTextColor
ScaleWindowExtEx
SetWindowExtEx
CopyMetaFileA
GetTextMetricsA
GetCharWidthA
StretchDIBits
CombineRgn
SetRectRgn
CreateRectRgnIndirect
PatBlt
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreatePatternBrush
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
CreateFontIndirectW
GetMapMode
SetMapMode
LPtoDP
DPtoLP
CreateCompatibleBitmap
DeleteObject
SelectObject
StretchBlt
BitBlt
DeleteDC
GetStockObject
CreateCompatibleDC
GetDIBits
CreateDIBSection
GetTextExtentPoint32A
CreateSolidBrush
GetObjectA
GetTextExtentPointA
CreateDIBitmap
CreateFontIndirectA
GetDeviceCaps
SelectClipRgn
CreateFontA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
RestoreDC
SaveDC
CreateBitmap
GetClipBox
SetBkMode
SetBkColor
SetTextColor
SetStretchBltMode
IntersectClipRect
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameW
advapi32
CloseServiceHandle
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegQueryInfoKeyA
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExW
RegSetValueExW
RegNotifyChangeKeyValue
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteValueW
RegFlushKey
RegCreateKeyExW
GetUserNameW
RegLoadKeyA
RegRestoreKeyA
GetUserNameA
RegSaveKeyA
OpenSCManagerA
OpenServiceA
RegCloseKey
DuplicateTokenEx
GetLengthSid
SetTokenInformation
CreateProcessAsUserW
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
RegEnumValueA
shell32
SHGetMalloc
SHGetDesktopFolder
Shell_NotifyIconA
SHBrowseForFolderW
SHGetPathFromIDListW
SHFileOperationW
SHFileOperationA
ShellExecuteW
FindExecutableW
ShellExecuteExA
ShellExecuteExW
SHGetFileInfoW
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
comctl32
ImageList_AddMasked
ImageList_Add
ImageList_Remove
ord17
ord8
ImageList_BeginDrag
ImageList_DragShowNolock
ImageList_DragMove
ImageList_EndDrag
ImageList_DragLeave
ImageList_Draw
ImageList_DragEnter
ImageList_GetIcon
ImageList_Destroy
ImageList_Create
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
oledlg
ord8
ole32
CoTaskMemFree
OleUninitialize
CreateStreamOnHGlobal
CoRevokeClassObject
CoInitialize
CoUninitialize
CoSetProxyBlanket
OleGetClipboard
CoRegisterClassObject
CoGetObject
StringFromGUID2
CoCreateInstance
ReleaseStgMedium
OleFlushClipboard
OleIsCurrentClipboard
DoDragDrop
CoFreeUnusedLibraries
CLSIDFromProgID
CLSIDFromString
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoRegisterMessageFilter
CoTaskMemAlloc
OleDuplicateData
CoDisconnectObject
RevokeDragDrop
CoLockObjectExternal
OleInitialize
RegisterDragDrop
olepro32
ord251
ord253
oleaut32
SysAllocString
SysAllocStringByteLen
VariantTimeToSystemTime
VariantChangeType
VariantCopy
VariantInit
VariantClear
LoadTypeLibEx
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElement
LoadTypeLi
SysStringLen
SysAllocStringLen
SysFreeString
wininet
InternetSetCookieA
InternetGetCookieA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
InternetCanonicalizeUrlW
InternetCombineUrlA
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 576KB - Virtual size: 573KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 924KB - Virtual size: 923KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ