Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_6c0be7a9b1fd112e633fd7664d213c76_icedid.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-10_6c0be7a9b1fd112e633fd7664d213c76_icedid.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_6c0be7a9b1fd112e633fd7664d213c76_icedid
-
Size
1004KB
-
MD5
6c0be7a9b1fd112e633fd7664d213c76
-
SHA1
78040c2e3fd15064022a058ad071c5e105856ec4
-
SHA256
f65b7f97ecee5f302e257a97c980e31b1e9d7ee17ccf3f74ec4bf3b97ca23647
-
SHA512
51b8bfb43918156e6df4e3dd82dd3afe43da8fac03a1ebda0d6e689c7d9cb170909b7d58c90a502c01deaf0d8df63bb898dc3126856dbab42e3a1fa3248cd12a
-
SSDEEP
12288:g1JmJuFUY4UgnqBWqtGU8T6Lebf85gG5FkyNWXzCvGDDhMCrh8H98Ge5MFrV0fU5:gGMFUYNgnqAqYU8AeQ/5FnWk8h1il
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-10_6c0be7a9b1fd112e633fd7664d213c76_icedid
Files
-
2024-07-10_6c0be7a9b1fd112e633fd7664d213c76_icedid.exe windows:4 windows x86 arch:x86
7c567b1e008f9d378e5d9133c677fa09
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
StgCreateDocfileOnILockBytes
CoInitializeEx
CoCreateInstance
CreateILockBytesOnHGlobal
OleSetContainedObject
ReleaseStgMedium
OleDuplicateData
OleCreateStaticFromData
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
OleRun
CLSIDFromProgID
CLSIDFromString
StgOpenStorageOnILockBytes
CoGetClassObject
OleIsCurrentClipboard
OleFlushClipboard
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
CoUninitialize
winmm
PlaySoundA
gdiplus
GdipDeleteGraphics
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromScan0
GdipDisposeImage
GdipGetImageType
GdipGetImageBounds
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCreateFromHDC2
GdipGetImageGraphicsContext
GdipSetInterpolationMode
GdipGraphicsClear
GdipDrawImageI
GdipDrawImageRectRectI
GdipCloneImage
GdipDrawImageRectI
GdipSetClipRectI
GdipGetImageHeight
GdipGetImagePixelFormat
GdipGetImagePaletteSize
GdipGetImagePalette
GdipLoadImageFromStream
GdipCreateBitmapFromStream
kernel32
GetVolumeInformationA
GetFullPathNameA
GetFileTime
GlobalFlags
LocalAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
FindResourceExA
WritePrivateProfileStringA
SetErrorMode
HeapFree
HeapAlloc
VirtualAlloc
VirtualQuery
RtlUnwind
HeapReAlloc
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoW
SetEnvironmentVariableA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
lstrcmpA
VirtualProtect
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
SetLastError
FreeResource
GetFileAttributesA
GetSystemInfo
ExitThread
SetFilePointer
GlobalReAlloc
TerminateThread
MulDiv
FileTimeToLocalFileTime
ExpandEnvironmentStringsA
CreateEventA
GetTempPathA
Sleep
DeleteFileA
CreateThread
FindFirstFileA
FindClose
CopyFileA
WriteFile
DuplicateHandle
LoadLibraryA
GetCurrentDirectoryA
FileTimeToSystemTime
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
FreeLibrary
GlobalLock
GlobalUnlock
InterlockedDecrement
InterlockedIncrement
EnterCriticalSection
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
GetCurrentProcess
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
GetVersion
lstrcmpiA
lstrlenW
lstrlenA
CompareStringA
CompareStringW
GlobalAlloc
GetDiskFreeSpaceA
LocalFree
GlobalFree
FormatMessageA
GetTickCount
GetProcAddress
GetModuleHandleA
CloseHandle
ReadFile
GetFileSize
CreateFileA
GetModuleFileNameA
LeaveCriticalSection
user32
SetRect
ShowOwnedPopups
GetMenuItemInfoA
DestroyMenu
TranslateAcceleratorA
SetMenu
SetRectEmpty
CreatePopupMenu
InsertMenuItemA
LoadAcceleratorsA
ReuseDDElParam
UnpackDDElParam
IsRectEmpty
CopyAcceleratorTableA
GetDCEx
LockWindowUpdate
MessageBeep
InvalidateRgn
GetNextDlgGroupItem
RegisterClipboardFormatA
PostThreadMessageA
WaitMessage
MapDialogRect
GetAsyncKeyState
ValidateRect
EndPaint
BeginPaint
GrayStringA
DrawTextExA
TabbedTextOutA
FillRect
WindowFromPoint
wsprintfA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
RegisterWindowMessageA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
MessageBoxA
GetScrollRange
GetScrollPos
SetForegroundWindow
GetMenu
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetWindowTextLengthA
MoveWindow
GetDlgCtrlID
IsDialogMessageA
SendDlgItemMessageA
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
KillTimer
GetDC
mouse_event
ShowCursor
GetClassLongA
SetScrollRange
SetScrollPos
SetTimer
ScreenToClient
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
EnumChildWindows
SetWindowContextHelpId
CopyRect
SetWindowTextA
DeleteMenu
SetCursor
LoadIconA
SetParent
DestroyIcon
GetClipboardData
CloseClipboard
TrackPopupMenu
LoadStringA
GetSubMenu
PostQuitMessage
DrawTextA
ShowWindow
BringWindowToTop
CharNextA
GetKeyState
LoadImageA
SetWindowPos
GetWindowTextA
SetFocus
IsWindowVisible
ClientToScreen
IsIconic
GetSystemMenu
LoadMenuA
SetMenuItemInfoA
AppendMenuA
DrawIcon
SetClassLongA
GetDesktopWindow
GetWindowDC
ReleaseDC
LoadBitmapA
SetWindowLongA
GetSystemMetrics
IsWindow
GetWindowLongA
UpdateWindow
PostMessageA
GetWindowRect
SetWindowRgn
GetCursorPos
ReleaseCapture
GetSysColor
GetParent
SetCapture
InvalidateRect
GetClientRect
DrawEdge
GetSysColorBrush
OffsetRect
InflateRect
PtInRect
LoadCursorA
EmptyClipboard
SetClipboardData
UnregisterClassA
SendMessageA
EnableWindow
OpenClipboard
GetFocus
CharUpperA
WinHelpA
ShowScrollBar
gdi32
RoundRect
CreatePolygonRgn
GetRgnBox
EnumFontFamiliesExA
DPtoLP
PatBlt
GetMapMode
SetRectRgn
CreatePatternBrush
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
GetWindowExtEx
GetViewportExtEx
SelectClipRgn
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
GetTextColor
GetBkColor
CombineRgn
CreateRectRgnIndirect
CreateBrushIndirect
GetStockObject
GetTextMetricsA
GetTextExtentPoint32A
CreateRectRgn
GetDeviceCaps
CreateBitmap
CreateDIBSection
SetDIBColorTable
CreateDIBPatternBrushPt
CreatePen
MoveToEx
LineTo
DeleteDC
GetObjectA
CreateFontA
CreateFontIndirectA
GetDIBits
SetDIBits
CreateRoundRectRgn
CreateSolidBrush
CreateCompatibleBitmap
SelectObject
SetPixel
BitBlt
Rectangle
CreateCompatibleDC
DeleteObject
Polygon
comdlg32
ChooseFontA
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
ChooseColorA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyA
RegOpenKeyA
GetUserNameA
RegEnumKeyA
RegDeleteKeyA
shell32
DragFinish
DragQueryFileA
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetMalloc
SHFileOperationA
ord165
Shell_NotifyIconA
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
comctl32
ImageList_SetBkColor
FlatSB_SetScrollPos
FlatSB_SetScrollRange
FlatSB_ShowScrollBar
FlatSB_EnableScrollBar
ImageList_Destroy
FlatSB_SetScrollProp
InitializeFlatSB
ImageList_LoadImageA
ImageList_ReplaceIcon
FlatSB_GetScrollProp
FlatSB_GetScrollInfo
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_AddMasked
ImageList_Create
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
oledlg
ord8
oleaut32
VarUI4FromStr
VariantInit
DispCallFunc
VariantClear
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SysAllocStringLen
SysFreeString
SystemTimeToVariantTime
VarUdateFromDate
SafeArrayGetElemsize
SafeArrayCreate
SysStringLen
VariantChangeType
SysAllocString
VariantCopy
OleCreateFontIndirect
SysAllocStringByteLen
ws2_32
WSAStartup
WSACleanup
closesocket
accept
socket
select
htonl
inet_addr
bind
WSAGetLastError
WSASetLastError
connect
sendto
recvfrom
WSAAsyncSelect
send
recv
shutdown
listen
htons
shlwapi
PathRemoveExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
Sections
.text Size: 484KB - Virtual size: 481KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 136KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 368KB - Virtual size: 366KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ