Static task
static1
Behavioral task
behavioral1
Sample
2024-05-16_231dab74c9be8945ed0aae52eb3d81e5_icedid.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-16_231dab74c9be8945ed0aae52eb3d81e5_icedid.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-16_231dab74c9be8945ed0aae52eb3d81e5_icedid
-
Size
664KB
-
MD5
231dab74c9be8945ed0aae52eb3d81e5
-
SHA1
71aaa648c3b0fd09a8761da75a3fb86aeeccc163
-
SHA256
07020ef91a4da6eeeba927f9e52d973168f79459468c6217a5888bc2b1d49966
-
SHA512
f032dee347738de1f44da276b2f3841d9d591c3037b06f971d5e13e88170cc548d7d267239d0c78ecb0d7d5042d04bd4828aedb138648bc905f78874615bd697
-
SSDEEP
12288:mx+Pm3K9FGd9cr/QwC+lfLUmCpDr4x+pucfKfKSYdmXVcSoTnT0:4im34Gd9cr/QwC+lfLUmCpDr4x+pDKf3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-16_231dab74c9be8945ed0aae52eb3d81e5_icedid
Files
-
2024-05-16_231dab74c9be8945ed0aae52eb3d81e5_icedid.exe windows:4 windows x86 arch:x86
ad72569e46e858ea75c488063cb235e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
sndPlaySoundA
kernel32
HeapFree
GetLocalTime
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetDriveTypeA
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapDestroy
HeapAlloc
GetStdHandle
GetACP
IsValidCodePage
SetHandleCount
GetFileType
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
SetStdHandle
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
SetErrorMode
LocalFileTimeToFileTime
CreateFileA
GetShortPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
SystemTimeToFileTime
FileTimeToSystemTime
GetThreadLocale
FindResourceExA
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
lstrcmpA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetDiskFreeSpaceA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
GetSystemDirectoryA
InterlockedDecrement
GetModuleFileNameW
FormatMessageA
LocalFree
MulDiv
GetCurrentProcessId
VirtualProtect
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
SetLastError
lstrcmpW
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryA
GetProcAddress
CompareStringA
GetLastError
WideCharToMultiByte
InterlockedExchange
GetVersion
lstrcmpiA
MultiByteToWideChar
GetStringTypeExA
CompareStringW
GetProfileStringA
CreateDirectoryA
ReleaseMutex
GetModuleFileNameA
CreateMutexA
CloseHandle
OpenMutexA
GetVersionExA
lstrlenA
CopyFileA
FindClose
FindNextFileA
FindFirstFileA
GetFullPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryA
FileTimeToDosDateTime
FileTimeToLocalFileTime
GlobalFree
GlobalUnlock
lstrcpyA
GlobalLock
GlobalSize
GlobalAlloc
GetTickCount
Sleep
HeapCreate
user32
CreateMenu
PostThreadMessageA
GetTabbedTextExtentA
DestroyIcon
GetDCEx
LockWindowUpdate
RegisterClipboardFormatA
ShowOwnedPopups
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
DestroyCursor
IsZoomed
GetMenuItemInfoA
InflateRect
DrawFocusRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
GetMenuStringA
InsertMenuA
RemoveMenu
ReuseDDElParam
LoadMenuA
DestroyMenu
GetWindowThreadProcessId
ReleaseCapture
LoadAcceleratorsA
InsertMenuItemA
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
IsDialogMessageA
SetDlgItemTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
CheckMenuItem
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetActiveWindow
MapDialogRect
ShowWindow
GetAsyncKeyState
IsWindowEnabled
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
CopyAcceleratorTableA
SetWindowsHookExA
CallNextHookEx
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
UpdateWindow
GetClientRect
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
GetParent
EqualRect
DeferWindowPos
CopyRect
GetScrollInfo
SetScrollInfo
PtInRect
SetWindowPlacement
GetDlgCtrlID
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
CharUpperA
SetRect
GetSystemMetrics
GetWindowRect
GetMenu
PeekMessageA
SetWindowTextA
SetCapture
SetWindowRgn
DrawIcon
FindWindowA
UnregisterClassA
GetSysColorBrush
GetSystemMenu
DeleteMenu
IsRectEmpty
SetParent
WindowFromPoint
KillTimer
GetCapture
SetTimer
LoadIconA
DefWindowProcA
DrawMenuBar
EnableMenuItem
GetDesktopWindow
GetKeyState
ReleaseDC
GetDC
ScreenToClient
GetCursorPos
AppendMenuA
CreatePopupMenu
MessageBoxA
MessageBeep
InvalidateRect
PostMessageA
CloseClipboard
GetClipboardData
OpenClipboard
SetClipboardData
EmptyClipboard
SetCursor
LoadCursorA
SendMessageA
EnableWindow
GetClassLongA
UnpackDDElParam
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
DeleteDC
CreatePatternBrush
GetStockObject
CreateSolidBrush
CreateRectRgnIndirect
PatBlt
DPtoLP
StartPage
EndPage
SetAbortProc
AbortDoc
EndDoc
GetViewportOrgEx
SetViewportOrgEx
GetCharWidthA
CreateFontA
StretchDIBits
GetBkColor
EnumFontFamiliesExA
SetRectRgn
CombineRgn
CreateEllipticRgn
LPtoDP
Ellipse
GetNearestColor
GetBkMode
GetPolyFillMode
GetROP2
GetStretchBltMode
GetTextColor
GetTextAlign
GetTextFaceA
GetWindowOrgEx
SelectClipRgn
DeleteObject
SetTextAlign
MoveToEx
LineTo
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
StartDocA
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
GetObjectA
Rectangle
CreateFontIndirectA
IntersectClipRect
ExcludeClipRect
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
CreateCompatibleDC
CreateCompatibleBitmap
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetTextExtentPoint32A
GetTextMetricsA
CreatePen
CreateDCA
GetDeviceCaps
CreateRectRgn
comdlg32
GetFileTitleA
ChooseFontA
GetSaveFileNameA
GetOpenFileNameA
CommDlgExtendedError
winspool.drv
GetJobA
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
GetFileSecurityA
SetFileSecurityA
RegOpenKeyA
RegSetValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegCreateKeyA
shell32
DragQueryPoint
ShellExecuteA
SHFileOperationA
DragAcceptFiles
SHGetSpecialFolderPathA
ExtractIconA
SHGetFileInfoA
DragFinish
DragQueryFileA
FindExecutableA
shlwapi
PathRemoveExtensionA
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
IsAccelerator
OleTranslateAccelerator
oleaut32
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 464KB - Virtual size: 461KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 300.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ