Behavioral task
behavioral1
Sample
2024-06-02_725e2b9b603623bb3d950219c5360bf3_icedid_plugx.exe
Resource
win7-20240419-en
General
-
Target
2024-06-02_725e2b9b603623bb3d950219c5360bf3_icedid_plugx
-
Size
19.1MB
-
MD5
725e2b9b603623bb3d950219c5360bf3
-
SHA1
6056c58a5f1aaf1368ceaa5fb74e02b2d484d897
-
SHA256
1fc30924bbfa0e0ad05bf284d230de082d0c44a2268b9cac8683a7d0b967ea72
-
SHA512
e6b64bc848d841a3a4303e2df1e1d9a6cb28f4fe4430084d38c600d75d07508821a9ab1186ddcfb4ad7adc0eac8c6c21fd1d2fbf9f6ac4d07413b79c8d80eb41
-
SSDEEP
393216:1xKfYW1vBiE9xABiE9xC1F1p1NBiE9xdE:TW1Zkk1F1p1j7
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-02_725e2b9b603623bb3d950219c5360bf3_icedid_plugx
Files
-
2024-06-02_725e2b9b603623bb3d950219c5360bf3_icedid_plugx.exe windows:4 windows x86 arch:x86
60108ffb93dda4e379b39358df5a47df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetWaitableTimer
LoadLibraryExA
FreeLibrary
Module32First
Module32Next
GetCurrentProcess
lstrcpynW
VirtualQuery
CreateWaitableTimerA
CreateThread
CreateProcessA
PeekNamedPipe
SetProcessAffinityMask
OpenThread
GetExitCodeThread
CreateRemoteThread
VirtualFreeEx
GetProcAddress
GetModuleHandleA
RtlMoveMemory
DuplicateHandle
lstrlenW
lstrcpyA
VirtualQueryEx
ReadProcessMemory
DeviceIoControl
LeaveCriticalSection
TlsFree
GetLastError
CreateFileA
RtlZeroMemory
InitializeCriticalSection
GetCurrentThreadId
EnterCriticalSection
DeleteCriticalSection
HeapAlloc
HeapFree
lstrcmpW
lstrcmpiW
GetProcessHeap
ExitProcess
HeapReAlloc
IsBadReadPtr
LCMapStringA
WriteFile
GetDiskFreeSpaceExA
GetCurrentDirectoryA
ReadFile
GetFileSize
DeleteFileA
GetTickCount
GetModuleFileNameA
GetUserDefaultLCID
GetSystemDirectoryA
SetCurrentDirectoryA
GetStartupInfoA
FindNextFileA
FindFirstFileA
FindClose
SetFileAttributesA
Sleep
GetCommandLineA
LoadLibraryA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
GetVersion
RtlUnwind
InterlockedDecrement
InterlockedIncrement
TerminateProcess
TlsSetValue
TlsAlloc
lstrcpyn
GetWindowsDirectoryA
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
TerminateThread
HeapCreate
VirtualAllocEx
WriteProcessMemory
VirtualProtect
WideCharToMultiByte
GetNativeSystemInfo
OpenProcess
IsWow64Process
lstrcpynA
WaitForSingleObject
GetVersionExA
CopyFileA
GetTempPathA
GetTempFileNameA
MultiByteToWideChar
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
HeapDestroy
VirtualFree
RaiseException
VirtualAlloc
IsBadWritePtr
SetFilePointer
LCMapStringW
RaiseException
GetLocalTime
RtlUnwind
GetStartupInfoA
GetOEMCP
GetCPInfo
GetProcessVersion
SetErrorMode
GlobalFlags
GetCurrentThread
GetFileTime
LocalReAlloc
GlobalHandle
LocalAlloc
lstrcmpA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpiA
DuplicateHandle
lstrcpynA
FileTimeToLocalFileTime
GetFileType
SetEnvironmentVariableA
GetACP
SetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
InterlockedDecrement
InterlockedIncrement
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
OpenEventA
WaitNamedPipeA
SetNamedPipeHandleState
SuspendThread
ReleaseMutex
CreateMutexA
TerminateThread
FileTimeToSystemTime
GetVersion
GetLocaleInfoA
GetTimeZoneInformation
TerminateProcess
GetCurrentProcess
GetWindowsDirectoryA
GetSystemDirectoryA
InterlockedCompareExchange
AreFileApisANSI
CreateFileW
CreateFileMappingW
CreateMutexW
DeleteFileW
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
SetEnvironmentVariableW
LCMapStringA
LCMapStringW
IsBadWritePtr
IsValidLocale
IsValidCodePage
EnumSystemLocalesA
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
IsBadCodePtr
GetLocaleInfoW
InterlockedExchange
GetEnvironmentStrings
FormatMessageW
GetDiskFreeSpaceW
GetFileAttributesW
GetFileAttributesExW
GetFileSize
GetFullPathNameW
GetSystemTime
CloseHandle
WaitForSingleObject
CreateProcessA
GetTickCount
GetCommandLineA
MulDiv
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
GetVolumeInformationA
SetCurrentDirectoryA
GetCurrentDirectoryA
CreateDirectoryA
CopyFileA
DeleteFileA
MoveFileA
GetFileAttributesA
SetFileAttributesA
FindClose
FindFirstFileA
GetTempPathA
GlobalUnlock
GlobalLock
GlobalAlloc
ExpandEnvironmentStringsA
Sleep
CreateEventA
CreateThread
GetPrivateProfileStringA
WritePrivateProfileStringA
GetVersionExA
GetLastError
LoadLibraryA
FreeLibrary
GetFullPathNameA
WideCharToMultiByte
MultiByteToWideChar
GetUserDefaultLCID
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
GlobalReAlloc
GetDriveTypeA
FindNextFileA
lstrcpyA
WinExec
lstrlenA
lstrcatA
InitializeCriticalSection
DeleteCriticalSection
GlobalFree
GlobalSize
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
RemoveDirectoryA
lstrlenW
ReadFile
LockResource
LoadResource
FindResourceA
SetEvent
CreateFileA
WaitForMultipleObjects
WriteFile
GetProfileStringA
LeaveCriticalSection
EnterCriticalSection
ReleaseSemaphore
ResumeThread
CreateSemaphoreA
VirtualAlloc
VirtualFree
GetSystemInfo
SetLastError
VirtualProtect
IsBadReadPtr
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
OpenFileMappingA
GetCurrentProcessId
UnlockFileEx
UnlockFile
SystemTimeToFileTime
SetFilePointer
SetEndOfFile
QueryPerformanceCounter
LockFileEx
LockFile
LocalFree
LoadLibraryW
HeapValidate
HeapSize
HeapDestroy
HeapCreate
GetTempPathW
GetSystemTimeAsFileTime
shlwapi
StrToIntExW
StrToIntW
PathFindExtensionA
StrToIntExA
PathFindFileNameA
PathFileExistsA
ws2_32
WSAStartup
WSACleanup
htons
ntohl
accept
getpeername
recv
connect
ioctlsocket
recvfrom
setsockopt
socket
inet_addr
inet_ntoa
gethostbyname
WSAStartup
WSACleanup
select
send
closesocket
WSAAsyncSelect
htons
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
user32
PeekMessageA
ShowWindow
RegisterWindowMessageA
EnumWindows
GetParent
IsWindowVisible
GetWindowThreadProcessId
GetAncestor
GetForegroundWindow
GetWindowTextA
GetClassNameA
MsgWaitForMultipleObjects
WindowFromPoint
SendMessageA
GetCursorPos
MessageBoxA
CallWindowProcA
TranslateMessage
DispatchMessageA
wsprintfA
GetMessageA
GetSystemMetrics
ClientToScreen
GetDlgItem
FindWindowA
InvalidateRect
ValidateRect
UpdateWindow
EqualRect
GetWindowRect
SetForegroundWindow
DestroyMenu
IsChild
ReleaseDC
IsRectEmpty
FillRect
GetDC
SetCursor
LoadCursorA
SetCursorPos
SetActiveWindow
GetSysColor
SetWindowLongA
GetWindowLongA
RedrawWindow
EnableWindow
IsWindowVisible
OffsetRect
PtInRect
DestroyIcon
IntersectRect
InflateRect
SetRect
SetScrollPos
SetScrollRange
GetScrollRange
SetCapture
GetCapture
ReleaseCapture
SetTimer
KillTimer
UnregisterClassA
LoadBitmapA
CopyRect
ChildWindowFromPointEx
ScreenToClient
GetMessagePos
SetWindowRgn
DestroyAcceleratorTable
GetWindow
GetActiveWindow
SetFocus
IsIconic
PeekMessageA
SetMenu
GetMenu
DeleteMenu
GetSystemMenu
DefWindowProcA
GetClassInfoA
IsZoomed
PostQuitMessage
CopyAcceleratorTableA
GetKeyState
GetClipboardData
IsWindowEnabled
ShowWindow
SystemParametersInfoA
LoadImageA
EnumDisplaySettingsA
ClientToScreen
EnableMenuItem
GetSubMenu
GetDlgCtrlID
CreateAcceleratorTableA
CreateMenu
ModifyMenuA
AppendMenuA
CreatePopupMenu
DrawIconEx
CreateIconFromResource
CreateIconFromResourceEx
RegisterClipboardFormatA
SetRectEmpty
DispatchMessageA
GetMessageA
WindowFromPoint
DrawFocusRect
DrawEdge
DrawFrameControl
GetClientRect
LoadIconA
SetPropA
CreateWindowExA
RegisterClassA
GetPropA
DefWindowProcW
GetForegroundWindow
GetDesktopWindow
GetClassNameA
GetDlgItem
GetWindowTextA
SetWindowTextA
CloseClipboard
GetWindowTextLengthA
CharUpperA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
DestroyWindow
CreateDialogIndirectParamA
EndDialog
GetNextDlgTabItem
GetWindowPlacement
RegisterWindowMessageA
GetLastActivePopup
GetMessageTime
RemovePropA
CallWindowProcA
UnhookWindowsHookEx
GetClassLongA
CallNextHookEx
SetWindowsHookExA
GetMenuItemID
GetMenuItemCount
GetScrollPos
AdjustWindowRectEx
MapWindowPoints
SendDlgItemMessageA
ScrollWindowEx
IsDialogMessageA
MoveWindow
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
LoadStringA
GetSysColorBrush
SetParent
wsprintfA
WaitForInputIdle
GetFocus
GetParent
GetTopWindow
IsWindow
PostMessageA
DestroyCursor
SendMessageA
SetWindowPos
MessageBoxA
GetCursorPos
GetSystemMetrics
EmptyClipboard
SetClipboardData
TranslateMessage
OpenClipboard
TranslateAcceleratorA
WinHelpA
advapi32
RegOpenKeyA
RegSetValueExA
RegQueryValueExA
RegCloseKey
DeleteService
RegCreateKeyExA
CreateProcessAsUserA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CryptHashData
CryptGetHashParam
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
CreateServiceA
StartServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegQueryValueA
RegCreateKeyExA
RegEnumValueA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHGetSpecialFolderPathA
Shell_NotifyIconA
ole32
CLSIDFromProgID
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoUninitialize
OleRun
CLSIDFromString
OleInitialize
OleUninitialize
CLSIDFromString
CoCreateInstance
OleRun
psapi
GetModuleInformation
oleaut32
SafeArrayAccessData
VariantChangeType
VariantInit
SafeArrayAllocDescriptor
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
VarR8FromBool
VarR8FromCy
SysFreeString
SafeArrayGetElemsize
VariantCopy
SafeArrayUnaccessData
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayAllocData
SafeArrayGetUBound
VariantClear
VariantChangeType
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElement
VariantCopyInd
VariantInit
SysAllocString
SafeArrayDestroy
SafeArrayCreate
SafeArrayPutElement
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
UnRegisterTypeLi
SafeArrayGetUBound
winmm
waveOutRestart
midiStreamRestart
midiStreamClose
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutWrite
waveOutPause
waveOutReset
waveOutClose
waveOutGetNumDevs
waveOutOpen
midiOutUnprepareHeader
midiStreamOpen
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
rasapi32
RasGetConnectStatusA
RasHangUpA
gdi32
LineTo
MoveToEx
ExcludeClipRect
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
CreateEllipticRgn
CreateRoundRectRgn
GetTextColor
GetBkMode
GetBkColor
GetROP2
GetStretchBltMode
GetPolyFillMode
CreateCompatibleBitmap
CreateDCA
CreateBitmap
SelectObject
CreatePen
PatBlt
CombineRgn
CreateRectRgn
FillRgn
CreateSolidBrush
CreateFontIndirectA
GetStockObject
GetObjectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
CreateCompatibleDC
Ellipse
Rectangle
LPtoDP
DPtoLP
GetCurrentObject
RoundRect
GetTextExtentPoint32A
PtVisible
SetBkColor
CreateRectRgnIndirect
GetTextMetricsA
Escape
ExtTextOutA
TextOutA
RectVisible
GetDeviceCaps
ExtSelectClipRgn
GetViewportExtEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comctl32
ImageList_Destroy
ord17
wsock32
ntohs
getservbyname
WSAGetLastError
shutdown
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetConnectA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
comdlg32
GetSaveFileNameA
ChooseColorA
GetFileTitleA
GetOpenFileNameA
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14.4MB - Virtual size: 14.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.5MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ