Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_30abda6c9cb561f65da9738010553851_icedid.exe
Resource
win7-20240221-en
General
-
Target
2024-05-21_30abda6c9cb561f65da9738010553851_icedid
-
Size
3.8MB
-
MD5
30abda6c9cb561f65da9738010553851
-
SHA1
ef99364c39771930411231fb2994a89ebb0a5f7d
-
SHA256
7ddd22e0d30f07bccad8033979255d7d8114702e4f80eaa1cb53605169791bd4
-
SHA512
5292e9691e32125db441bb7286d7455a25472db7928ca35c2179062f1d8bc8e7f90d5e3b797e6c6dc0f34f4aa621d41acf6e26ab451fe85d02f5480d40de4fae
-
SSDEEP
49152:p4z3qGHXOLvcY2cx24AEi1vua7kj1G+anlTH+ow6eP9b317n8TVq:p42YYJE1v7K1G+atLw6eP1lb8TQ
Malware Config
Signatures
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-05-21_30abda6c9cb561f65da9738010553851_icedid
Files
-
2024-05-21_30abda6c9cb561f65da9738010553851_icedid.exe windows:4 windows x86 arch:x86
6aba83944d5cca5164007d0b8b587d45
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
socket
ioctlsocket
connect
inet_addr
WSAGetLastError
ntohl
htonl
closesocket
send
recv
__WSAFDIsSet
select
getsockopt
listen
bind
accept
getsockname
WSASetLastError
ntohs
WSACleanup
WSAStartup
gethostbyname
htons
kernel32
GlobalFlags
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetProcessVersion
GetCPInfo
GetOEMCP
GetFileTime
SetErrorMode
WritePrivateProfileStringA
FindResourceExA
RtlUnwind
SetEnvironmentVariableW
GetCurrentDirectoryW
SetCurrentDirectoryW
VirtualProtect
GetLocalTime
GetSystemTimeAsFileTime
RaiseException
HeapReAlloc
RemoveDirectoryA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetStartupInfoA
GetCommandLineA
GetACP
ExitThread
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
SetStdHandle
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
lstrlenW
GetCurrentThread
GetTickCount
GetProfileIntA
GetThreadLocale
GetFullPathNameA
FindFirstFileA
UnlockFile
LockFile
DuplicateHandle
lstrcmpA
SuspendThread
SetThreadPriority
ResumeThread
FileTimeToLocalFileTime
InterlockedIncrement
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
CreateProcessA
SetThreadExecutionState
GetVolumeInformationW
CompareFileTime
GetDiskFreeSpaceW
GetDiskFreeSpaceA
GetSystemInfo
InterlockedDecrement
GetComputerNameA
FindResourceA
SizeofResource
LoadResource
LockResource
GetCurrentDirectoryA
GetSystemDefaultLangID
GetVolumeInformationA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
lstrcpynA
CreateThread
SleepEx
ReadFile
CreateDirectoryA
CopyFileW
MoveFileA
LocalAlloc
SetLastError
CreateDirectoryW
GetFileAttributesExW
FileTimeToSystemTime
CreateWaitableTimerA
SetWaitableTimer
CancelWaitableTimer
SetFileAttributesW
FlushFileBuffers
DeviceIoControl
GetCurrentThreadId
TerminateProcess
GetUserDefaultLangID
SetEvent
lstrlenA
SetFileAttributesA
DeleteFileA
GetWindowsDirectoryW
lstrcmpiA
GetLocaleInfoA
GetDriveTypeW
GetVersion
GetCurrentProcessId
MoveFileW
RemoveDirectoryW
GetSystemTime
SystemTimeToFileTime
SetFileTime
LoadLibraryW
MoveFileExW
GetModuleHandleA
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
OpenProcess
lstrcatA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
SetEndOfFile
GetSystemDirectoryW
DeleteFileW
GetWindowsDirectoryA
GetVersionExA
GetExitCodeProcess
CreateFileA
GetCurrentProcess
CreateProcessW
GetModuleFileNameW
CreateEventA
WaitForMultipleObjects
ResetEvent
GlobalAlloc
GlobalFree
FindFirstFileW
FindNextFileW
FindClose
CreateFileW
CreateMutexA
OpenMutexA
WaitForSingleObject
ReleaseMutex
CloseHandle
GetSystemDirectoryA
GetModuleFileNameA
GetFileAttributesA
CopyFileA
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
GlobalSize
GlobalLock
GlobalUnlock
WideCharToMultiByte
GetFileAttributesW
GetLastError
FormatMessageA
LocalFree
MultiByteToWideChar
MulDiv
ExitProcess
GetProfileStringA
GetTimeZoneInformation
user32
GetDCEx
LockWindowUpdate
InflateRect
CharUpperA
IsClipboardFormatAvailable
ValidateRect
GrayStringA
DrawTextA
TabbedTextOutA
IsDialogMessageA
GetDlgItemTextA
GetMenuCheckMarkDimensions
GetMenuState
SetMenuItemBitmaps
SendDlgItemMessageA
MapWindowPoints
GetFocus
AdjustWindowRectEx
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
IsChild
WinHelpA
GetClassInfoA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
UnhookWindowsHookEx
CallWindowProcA
GetMessageTime
GetLastActivePopup
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
GetParent
IsWindowEnabled
GetActiveWindow
DrawTextW
DrawFrameControl
SetRect
SystemParametersInfoW
DrawStateA
ModifyMenuW
DeleteMenu
AppendMenuW
DrawIconEx
GetSysColorBrush
FillRect
FrameRect
PeekMessageA
UnionRect
ClientToScreen
WindowFromPoint
SetDlgItemTextA
GetWindowTextLengthW
GetWindowTextLengthA
CopyIcon
SetFocus
DestroyIcon
PostQuitMessage
GetMessageA
TranslateMessage
DispatchMessageA
UpdateWindow
SetCursorPos
GetClassNameA
CreateDialogParamW
CreateDialogParamA
GetPropA
RemovePropA
DefWindowProcW
DefWindowProcA
CreateWindowExA
SetWindowLongA
ShowWindow
RegisterClassA
DefDlgProcA
DestroyWindow
GetWindowLongA
GetWindowDC
BeginPaint
EndPaint
SetDlgItemTextW
RegisterWindowMessageA
RegisterClipboardFormatA
RemoveMenu
DrawFocusRect
GetMessagePos
ScreenToClient
LoadCursorA
SetCursor
EqualRect
GetCapture
ReleaseCapture
SetCapture
CreatePopupMenu
GetKeyState
ModifyMenuA
TrackPopupMenu
IsIconic
GetSystemMetrics
DrawIcon
OffsetRect
EnableMenuItem
SetClipboardViewer
CheckMenuItem
LoadImageW
LoadImageA
DestroyMenu
ChangeClipboardChain
GetMenu
EnumWindows
SetForegroundWindow
IsWindowVisible
wsprintfW
SendMessageW
LoadBitmapA
IsWindow
GetNextDlgGroupItem
CopyAcceleratorTableA
CharNextA
PostThreadMessageA
GetAsyncKeyState
SetRectEmpty
MapDialogRect
SetWindowContextHelpId
IntersectRect
IsRectEmpty
GetMenuItemCount
GetMenuItemID
GetSubMenu
AppendMenuA
CheckMenuRadioItem
GetCursorPos
PtInRect
InvalidateRect
GetClientRect
ReleaseDC
CopyRect
FindWindowA
GetWindowThreadProcessId
MsgWaitForMultipleObjects
MoveWindow
SetParent
KillTimer
SetTimer
wsprintfA
PostMessageA
GetForegroundWindow
ExitWindowsEx
MessageBeep
GetWindowTextA
MessageBoxW
GetWindowTextW
GetWindowRect
CreateWindowExW
SetWindowPos
SetWindowTextW
SetWindowTextA
GetDesktopWindow
MessageBoxA
GetDlgItem
GetSysColor
GetDlgCtrlID
LoadStringA
SendMessageA
GetWindow
GetDC
EnableWindow
LoadIconA
IsWindowUnicode
ExcludeUpdateRgn
ShowCaret
HideCaret
UnregisterClassA
SetPropA
gdi32
SelectClipRgn
GetBkColor
EnumFontFamiliesExA
GetTextColor
SetWindowExtEx
ScaleViewportExtEx
CopyMetaFileA
GetCharWidthA
StretchDIBits
CombineRgn
SetRectRgn
CreateRectRgnIndirect
PatBlt
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreatePatternBrush
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
GetMapMode
SetMapMode
LPtoDP
DPtoLP
GetTextMetricsA
CreateCompatibleBitmap
DeleteObject
SelectObject
StretchBlt
BitBlt
DeleteDC
GetStockObject
CreateCompatibleDC
IntersectClipRect
GetDIBits
CreateDIBSection
GetTextExtentPoint32A
CreateSolidBrush
GetObjectA
GetTextExtentPointA
CreateDIBitmap
CreateFontIndirectA
GetDeviceCaps
ScaleWindowExtEx
CreateFontA
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
RestoreDC
SaveDC
CreateBitmap
GetClipBox
SetBkMode
SetBkColor
SetTextColor
SetStretchBltMode
CreateFontIndirectW
ExcludeClipRect
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameW
advapi32
CloseServiceHandle
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegEnumKeyA
RegQueryInfoKeyA
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
RegNotifyChangeKeyValue
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegFlushKey
RegCreateKeyExW
GetUserNameW
RegLoadKeyA
RegRestoreKeyA
GetUserNameA
RegSaveKeyA
OpenSCManagerA
OpenServiceA
RegCloseKey
DuplicateTokenEx
GetLengthSid
SetTokenInformation
CreateProcessAsUserW
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
RegEnumValueA
shell32
SHGetMalloc
SHGetDesktopFolder
Shell_NotifyIconA
SHBrowseForFolderW
SHGetPathFromIDListW
SHFileOperationW
SHFileOperationA
ShellExecuteW
FindExecutableW
ShellExecuteExA
ShellExecuteExW
SHGetFileInfoW
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
comctl32
ImageList_AddMasked
ImageList_Add
ImageList_Remove
ord17
ord8
ImageList_BeginDrag
ImageList_DragShowNolock
ImageList_DragMove
ImageList_EndDrag
ImageList_DragLeave
ImageList_Draw
ImageList_DragEnter
ImageList_GetIcon
ImageList_Destroy
ImageList_Create
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
oledlg
ord8
ole32
CoTaskMemFree
OleUninitialize
CreateStreamOnHGlobal
CoRevokeClassObject
CoInitialize
CoUninitialize
CoSetProxyBlanket
OleGetClipboard
CoRegisterClassObject
CoGetObject
StringFromGUID2
CoCreateInstance
ReleaseStgMedium
OleFlushClipboard
OleIsCurrentClipboard
DoDragDrop
CoFreeUnusedLibraries
CLSIDFromProgID
CLSIDFromString
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoRegisterMessageFilter
CoTaskMemAlloc
OleDuplicateData
CoDisconnectObject
RevokeDragDrop
CoLockObjectExternal
OleInitialize
RegisterDragDrop
olepro32
ord251
ord253
oleaut32
SysAllocString
SysAllocStringByteLen
VariantTimeToSystemTime
VariantChangeType
VariantCopy
VariantInit
VariantClear
LoadTypeLibEx
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElement
LoadTypeLi
SysStringLen
SysAllocStringLen
SysFreeString
wininet
InternetSetCookieA
InternetGetCookieA
InternetCrackUrlA
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoW
InternetCanonicalizeUrlW
InternetCombineUrlA
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 580KB - Virtual size: 577KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 200KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 924KB - Virtual size: 923KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ