Static task
static1
Behavioral task
behavioral1
Sample
2024-07-03_0e3edde75e239e55320a51493dd24d29_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-07-03_0e3edde75e239e55320a51493dd24d29_icedid.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-07-03_0e3edde75e239e55320a51493dd24d29_icedid
-
Size
3.1MB
-
MD5
0e3edde75e239e55320a51493dd24d29
-
SHA1
174bcf99e90b3b4fa35d7388324cbb8bcc492dee
-
SHA256
7d57a5bec51dce36a6648b7f988576920907cdd9729dfb0e5b5d0d536ce78419
-
SHA512
c41e27b3421bec5af957c09db3f9e212a7f555d73052d6ab63624aef2f33c1d1974c24fa9d5e742ec474d0b288990bbb9a3b887959decf404c0113769b6fa3ba
-
SSDEEP
98304:+eMCPSNe4Im2hwDq8MRJdEG7gQTH2SZ8zmQ2qV:+eHPSewDqTRJdd8fYimQ2g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-03_0e3edde75e239e55320a51493dd24d29_icedid
Files
-
2024-07-03_0e3edde75e239e55320a51493dd24d29_icedid.exe windows:4 windows x86 arch:x86
23fb27556df7c2802ef7403902f31acc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
TerminateProcess
HeapSize
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetTickCount
SetErrorMode
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentDirectoryA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
InterlockedIncrement
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
RaiseException
InterlockedDecrement
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
GetModuleHandleA
GetProcAddress
SetLastError
MulDiv
FormatMessageA
lstrcpynA
FreeResource
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetLastError
MultiByteToWideChar
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
GetSystemDefaultLCID
CreateThread
SetThreadPriority
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CreateFileA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
OpenFile
_lclose
GlobalReAlloc
_llseek
LocalAlloc
LocalFree
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
_lread
GetCurrentProcess
CloseHandle
RemoveDirectoryA
GetComputerNameA
GetModuleFileNameA
Sleep
DeleteFileA
WinExec
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
SetCurrentDirectoryA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
GetLocalTime
GetLogicalDriveStringsA
GetDriveTypeA
GetDiskFreeSpaceExA
CreateDirectoryA
GetVersion
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetFileType
InterlockedExchange
user32
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextA
TabbedTextOutA
GetWindowTextLengthA
GetWindowTextA
GetFocus
RegisterWindowMessageA
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
CheckRadioButton
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
CharUpperA
DestroyIcon
ReleaseDC
ExitWindowsEx
GetSystemMetrics
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
ModifyMenuA
SetMenuItemBitmaps
LoadIconA
KillTimer
SetTimer
GetDC
GetClientRect
IsIconic
DrawIcon
PostQuitMessage
MessageBoxA
GetParent
EnableWindow
SendMessageA
PostThreadMessageA
SetWindowPos
RegisterClipboardFormatA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
SetCapture
DestroyMenu
LoadCursorA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
DrawTextExA
wsprintfA
GetClassLongA
gdi32
SetTextColor
SetMapMode
GetClipBox
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ExtSelectClipRgn
CreatePen
CreateSolidBrush
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
RestoreDC
SaveDC
Rectangle
PatBlt
SetDIBitsToDevice
GetStockObject
CreatePalette
SetBkMode
SetBkColor
CreateBitmap
DeleteObject
SelectPalette
RealizePalette
SelectObject
DeleteDC
AddFontResourceA
GetDeviceCaps
CreateICA
ScaleWindowExtEx
CreateFontIndirectA
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
GetUserNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegCreateKeyA
RegEnumKeyA
RegOpenKeyA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
ShellExecuteA
SHGetMalloc
SHGetFileInfoA
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoTaskMemAlloc
StgOpenStorageOnILockBytes
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
oleaut32
VariantClear
VariantInit
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocString
OleCreateFontIndirect
VariantChangeType
Sections
.text Size: 308KB - Virtual size: 306KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ