fcEXP
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_1e6a05095da213d61715c9aa041202ed_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-23_1e6a05095da213d61715c9aa041202ed_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_1e6a05095da213d61715c9aa041202ed_icedid
-
Size
3.0MB
-
MD5
1e6a05095da213d61715c9aa041202ed
-
SHA1
64b14117c56edcba2c3080350e1dea3faf6615ab
-
SHA256
ae1094cbbe7c5cbae1ca2f4c45694d8ad75ebb11f40317d231664551018c31cb
-
SHA512
1623f0d697f95910a0def17a52b1d658a38d366bebed8a81060456a5d54977ddacba515337b2a700a50036bf730c2f7de91c64374e8d642a949ef62d72ef317b
-
SSDEEP
49152:nL/1xQZ1/a3hPjz5+TtNFTIe165HkPrYKQH0O44BQvZTgtq:J6qhPjetNFEy6irjw0O40t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-23_1e6a05095da213d61715c9aa041202ed_icedid
Files
-
2024-05-23_1e6a05095da213d61715c9aa041202ed_icedid.exe windows:4 windows x86 arch:x86
1c2be9336d054b09dae6d33ea67b442d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
d3dx9_43
D3DXQuaternionMultiply
D3DXQuaternionInverse
D3DXQuaternionNormalize
D3DXMatrixDecompose
D3DXAssembleShader
D3DXMatrixTransformation
D3DXSaveSurfaceToFileA
D3DXSphereBoundProbe
D3DXMatrixRotationQuaternion
D3DXPlaneIntersectLine
D3DXPlaneNormalize
D3DXIntersectTri
D3DXMatrixRotationZ
D3DXQuaternionRotationAxis
D3DXPlaneFromPointNormal
D3DXPlaneFromPoints
D3DXMatrixTransformation2D
D3DXMatrixRotationX
D3DXVec3TransformCoord
D3DXCreateTexture
D3DXMatrixTranslation
D3DXMatrixRotationY
D3DXVec3Normalize
D3DXMatrixScaling
D3DXMatrixTranspose
D3DXMatrixMultiply
D3DXMatrixInverse
D3DXMatrixRotationYawPitchRoll
D3DXMatrixPerspectiveFovLH
D3DXMatrixOrthoLH
D3DXMatrixLookAtLH
D3DXLoadSurfaceFromFileInMemory
D3DXLoadSurfaceFromSurface
D3DXGetImageInfoFromFileInMemory
D3DXCreateTextureFromFileInMemoryEx
D3DXQuaternionSlerp
D3DXVec2Normalize
winmm
mmioOpenA
mmioRead
mmioAscend
mmioGetInfo
mmioAdvance
mmioSetInfo
mmioSeek
mmioDescend
mmioClose
timeGetTime
advapi32
CryptEncrypt
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
CryptGetHashParam
CryptDeriveKey
CryptCreateHash
CryptHashData
CryptVerifySignatureA
CryptDestroyHash
RegEnumValueA
RegCreateKeyExA
GetUserNameA
CryptAcquireContextA
CryptImportKey
CryptDestroyKey
CryptReleaseContext
RegSetValueExA
RegCreateKeyA
RegDeleteValueA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
CloseServiceHandle
ControlService
QueryServiceConfigA
StartServiceA
ChangeServiceConfigA
OpenServiceA
imm32
ImmSetConversionStatus
ImmGetCompositionStringA
ImmGetContext
ImmNotifyIME
ImmReleaseContext
ImmGetConversionStatus
ImmGetCandidateListA
dsound
ord11
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
dbghelp
StackWalk
GetTimestampForLoadedLibrary
EnumerateLoadedModules
psapi
GetModuleFileNameExA
EnumProcesses
EnumProcessModules
wtsapi32
WTSRegisterSessionNotification
kernel32
FindNextFileA
FindFirstFileA
GetSystemDefaultLangID
VirtualQuery
FreeLibrary
FormatMessageA
LoadLibraryExA
VirtualFree
VirtualProtect
VirtualAlloc
SetEndOfFile
QueryPerformanceFrequency
QueryPerformanceCounter
HeapFree
HeapAlloc
GetProcessHeap
WriteFile
CreateMutexA
GetExitCodeProcess
WaitForMultipleObjects
OpenEventA
CopyFileA
MoveFileExA
lstrcatA
GetCurrentThreadId
GetCurrentProcessId
OpenMutexA
TerminateThread
ReleaseMutex
GetComputerNameA
ExitProcess
GetSystemDirectoryA
GetModuleFileNameW
OpenFileMappingA
GetCurrentDirectoryA
GetTempFileNameA
GetTempPathA
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
PeekNamedPipe
InterlockedIncrement
lstrcpynA
GlobalUnlock
GlobalLock
SetLastError
GetPrivateProfileIntA
FindClose
GetPrivateProfileStringA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeResource
InterlockedDecrement
MoveFileA
FlushFileBuffers
LockFile
UnlockFile
GetVolumeInformationA
GetFullPathNameA
EnumResourceLanguagesA
ConvertDefaultLocale
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetDriveTypeA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
GetFileType
HeapSize
HeapDestroy
HeapCreate
IsBadWritePtr
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
GetLocaleInfoW
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
WritePrivateProfileStringA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
Module32First
Module32Next
GetExitCodeThread
TerminateProcess
LoadLibraryA
lstrcpyA
SearchPathA
OpenProcess
IsDebuggerPresent
GetProcAddress
MulDiv
DeleteCriticalSection
GetVersion
lstrcmpiA
lstrlenA
CompareStringA
CompareStringW
GetStringTypeExA
SizeofResource
LockResource
LoadResource
CreateFileMappingA
MapViewOfFile
GetFileSize
GlobalAlloc
ResetEvent
GlobalFree
UnmapViewOfFile
SetUnhandledExceptionFilter
GetLocalTime
GetCurrentProcess
GetCurrentThread
GetModuleHandleA
IsBadReadPtr
LocalAlloc
LocalLock
LocalUnlock
LocalFree
CreateToolhelp32Snapshot
CreateDirectoryA
GetModuleFileNameA
lstrcmpA
SetFilePointer
SetThreadLocale
CreateFileA
ReadFile
GetSystemInfo
CreateEventA
WaitForSingleObject
CloseHandle
DeleteFileA
CreateProcessA
Sleep
CreateThread
SetThreadPriority
ResumeThread
SetEvent
LeaveCriticalSection
EnterCriticalSection
GetTickCount
GetSystemTime
IsDBCSLeadByte
FindResourceA
user32
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
ModifyMenuA
SetMenuItemBitmaps
MapDialogRect
SetWindowContextHelpId
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetWindowDC
BeginPaint
EndPaint
GetNextDlgTabItem
CreateDialogIndirectParamA
GetDesktopWindow
GetNextDlgGroupItem
MessageBeep
CopyAcceleratorTableA
InvalidateRgn
GetSysColorBrush
DestroyMenu
CharNextA
RegisterClipboardFormatA
PostThreadMessageA
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
GetSysColor
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetSystemMetrics
GetWindow
GetWindowTextLengthA
GetWindowTextA
SetFocus
IsWindowEnabled
MoveWindow
GetDlgCtrlID
IsDialogMessageA
SendDlgItemMessageA
GetLastActivePopup
GetActiveWindow
GetMenuState
GetMenuStringA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
DestroyCaret
GetWindowLongA
ValidateRect
GetCaretBlinkTime
CallWindowProcA
IsChild
ChildWindowFromPointEx
GetFocus
InvalidateRect
ReleaseDC
IsRectEmpty
GetKeyboardLayout
wsprintfA
EnumChildWindows
SetCapture
IsWindowVisible
GetClientRect
DeleteMenu
GetWindowRect
ShowWindow
DialogBoxParamA
EndDialog
SetWindowTextA
GetDlgItem
SetWindowPos
GetParent
SetParent
SetForegroundWindow
LoadCursorA
EnumDisplaySettingsA
EnableWindow
DestroyCursor
ActivateKeyboardLayout
GetDC
IsIconic
SetWindowsHookExA
LoadAcceleratorsA
PeekMessageA
TranslateAcceleratorA
WaitMessage
MessageBoxA
UnhookWindowsHookEx
LoadIconA
GetForegroundWindow
UpdateWindow
CallNextHookEx
SendMessageA
SetRectEmpty
GetAsyncKeyState
GetKeyState
SetCursor
GetMessageA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
AdjustWindowRect
SetWindowLongA
PostQuitMessage
EqualRect
IntersectRect
MapVirtualKeyA
SetRect
ReleaseCapture
ClipCursor
GetCursorPos
OffsetRect
SetCursorPos
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsWindow
ShowCursor
ScreenToClient
ClientToScreen
InflateRect
PtInRect
CopyRect
UnregisterClassA
CharUpperA
SetActiveWindow
PostMessageA
gdi32
CreateFontA
CreateFontIndirectA
BitBlt
GetDeviceCaps
GetClipBox
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
SaveDC
RestoreDC
SetMapMode
CreateDIBSection
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateCompatibleDC
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetStockObject
CreateRectRgnIndirect
GetRgnBox
GetMapMode
GetBkColor
GetTextColor
SetViewportOrgEx
SelectObject
DeleteObject
DeleteDC
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathIsUNCA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
oledlg
ord8
ole32
CoUninitialize
CoInitialize
CoCreateInstance
CoSetProxyBlanket
CoTaskMemFree
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
oleaut32
SafeArrayDestroy
SysFreeString
VariantCopy
VariantChangeType
SysAllocStringByteLen
SysAllocStringLen
SystemTimeToVariantTime
SysStringLen
SysAllocString
VariantClear
VariantInit
OleCreateFontIndirect
ws2_32
inet_addr
setsockopt
ioctlsocket
WSASocketA
WSACleanup
sendto
WSASend
WSAAsyncSelect
gethostbyname
connect
recv
send
htons
getsockname
closesocket
socket
WSAStartup
WSAGetLastError
inet_ntoa
iphlpapi
GetAdaptersInfo
gdiplus
GdiplusShutdown
GdiplusStartup
GdipSetTextRenderingHint
GdipCreateFromHDC
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipDeleteFont
GdipDeleteGraphics
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDeleteBrush
GdipAlloc
GdipFree
GdipCreateFontFromDC
GdipMeasureString
GdipCreateSolidFill
GdipDrawString
d3d9
Direct3DCreate9
Exports
Exports
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 261KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 169KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ