Static task
static1
Behavioral task
behavioral1
Sample
2024-06-26_bb7ff6076e6166bd8f837ee13c6dfc11_icedid.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-26_bb7ff6076e6166bd8f837ee13c6dfc11_icedid.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-26_bb7ff6076e6166bd8f837ee13c6dfc11_icedid
-
Size
204KB
-
MD5
bb7ff6076e6166bd8f837ee13c6dfc11
-
SHA1
2af52c6ff4db56c9844bd54b73f994be20a0a902
-
SHA256
2a535102ac9a5f307853029d4fa38aef9a234972cb4bc6843a1904a3c9e40cb3
-
SHA512
937f97edd43ad8797ead207f1b9ba958a8662fa4710045aa4cafb56e8dcc0f19840364bcff875c60c1f027ae68436b9f3c46fb176fa33d74b2208077287db18d
-
SSDEEP
3072:apXhEDQ06zgc5D5J4x7teQK5lZ8zqbQKrJWHp42qWY9lE8iYgs1Hhw:a4DLc5Db4xwQUXI0ZFL2mc8vHh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-26_bb7ff6076e6166bd8f837ee13c6dfc11_icedid
Files
-
2024-06-26_bb7ff6076e6166bd8f837ee13c6dfc11_icedid.exe windows:4 windows x86 arch:x86
8e6a0025877148e6b054e447a6117dd8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetCurrentProcess
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
ExitThread
CreateThread
TerminateProcess
HeapReAlloc
HeapSize
HeapDestroy
FlushFileBuffers
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetStdHandle
GetLocaleInfoW
SetFilePointer
GetOEMCP
GetCPInfo
GlobalFlags
WritePrivateProfileStringA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcmpW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetCurrentThread
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesA
CreateEventA
SuspendThread
SetEvent
GetCurrentThreadId
SetThreadPriority
FindResourceA
LoadResource
LockResource
SizeofResource
FormatMessageA
lstrcpynA
CreateMailslotA
lstrcatA
GetComputerNameA
ReadFile
Sleep
CreateFileA
WriteFile
CloseHandle
WaitForSingleObject
TerminateThread
ResumeThread
lstrcpyA
GetModuleFileNameA
GetTickCount
GlobalAlloc
GlobalLock
GetTempPathA
GlobalHandle
GlobalUnlock
GlobalFree
SetLastError
GetModuleHandleA
GetProcAddress
LocalAlloc
lstrcmpA
LocalFree
FreeLibrary
LoadLibraryA
lstrlenA
lstrcmpiA
GetVersion
WideCharToMultiByte
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
MultiByteToWideChar
HeapCreate
GetLastError
user32
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
SetCursor
SetWindowTextA
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
GetDlgCtrlID
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetSystemMetrics
GetActiveWindow
wsprintfA
DefWindowProcA
PostMessageA
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
MessageBoxA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
LoadCursorA
GetDC
DestroyMenu
PostQuitMessage
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
FindWindowA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
ValidateRect
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
gdi32
DeleteDC
TextOutA
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetDeviceCaps
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
ExtTextOutA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
OpenPrinterW
EnumPrintersA
advapi32
GetUserNameA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
comctl32
ord17
shlwapi
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE