Static task
static1
Behavioral task
behavioral1
Sample
2024-09-04_83dca36690de2504d3a61b514213a787_floxif_icedid.exe
Resource
win7-20240704-en
General
-
Target
2024-09-04_83dca36690de2504d3a61b514213a787_floxif_icedid
-
Size
436KB
-
MD5
83dca36690de2504d3a61b514213a787
-
SHA1
3ebfbebccd726c72e050784234010f0242e73a83
-
SHA256
a4e887aea99cd7dacbb18cb370e59fe7f50b192edda4c13e7d158536c91dfe3b
-
SHA512
51ea60494e7fea3315c01a1b605771e098e2268a89d7a1a582ffe8a521032eeb1dff017947703a52d4270493bb8ee72bf53630a2e146dd5ba3458e97772e3ef9
-
SSDEEP
12288:qbQ9FwLOr6q8LjvNWyBJb5x0i94l9BjvrEH7Jy:NwLOr6qmJVG3TrEH7Jy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-04_83dca36690de2504d3a61b514213a787_floxif_icedid
Files
-
2024-09-04_83dca36690de2504d3a61b514213a787_floxif_icedid.exe windows:4 windows x86 arch:x86
58c888e97d77d094b03be8a643d0305c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostQuitMessage
DestroyMenu
ValidateRect
EndPaint
BeginPaint
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
GetWindowThreadProcessId
ShowWindow
MessageBoxA
GetMessageA
TranslateMessage
UnhookWindowsHookEx
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
SendMessageA
GetParent
SetFocus
IsWindow
IsWindowEnabled
EnableWindow
GetFocus
UnregisterClassA
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
EndDialog
GetNextDlgTabItem
GetDlgItem
GetWindowLongA
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
GetActiveWindow
GetDesktopWindow
GetWindow
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetWindowPos
SetWindowLongA
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
PtInRect
CopyRect
AdjustWindowRectEx
RegisterClassA
GetClassInfoA
GetClassInfoExA
CreateWindowExA
PostMessageA
GetMenu
GetClientRect
UpdateWindow
SetForegroundWindow
GetKeyState
MapWindowPoints
PeekMessageA
GetMessagePos
GetMessageTime
GetTopWindow
DispatchMessageA
GetLastActivePopup
GetForegroundWindow
GetWindowTextA
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
GetCapture
WinHelpA
SendDlgItemMessageA
LoadIconA
RegisterWindowMessageA
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
IsDialogMessageA
SetWindowTextA
winmm
mciSendCommandA
kernel32
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
FreeResource
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCurrentThreadId
lstrcmpA
GetThreadLocale
GetCurrentProcessId
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
GetFileAttributesA
GetSystemTimeAsFileTime
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
HeapFree
HeapReAlloc
VirtualAlloc
GetCommandLineA
GetProcessHeap
RtlUnwind
RaiseException
HeapSize
GetTimeZoneInformation
SetHandleCount
GetStdHandle
GetFileType
VirtualFree
HeapDestroy
HeapCreate
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
SetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetExitCodeProcess
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsGetValue
LocalAlloc
GetVersionExA
LoadLibraryA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
FreeLibrary
InterlockedDecrement
SetLastError
GetProcAddress
ExitThread
GetExitCodeThread
OutputDebugStringA
ClearCommError
GetOverlappedResult
WaitForSingleObject
CreateEventA
WaitCommEvent
LeaveCriticalSection
EnterCriticalSection
SetCommMask
PurgeComm
SetCommTimeouts
SetCommState
GetCommState
SetupComm
InitializeCriticalSection
CreateFileA
GetDriveTypeA
GetLogicalDriveStringsA
DeviceIoControl
CompareStringA
GetVersion
lstrlenA
InterlockedExchange
CompareStringW
GetLastError
WideCharToMultiByte
FindClose
SetHandleInformation
CreatePipe
CreateProcessA
GetTickCount
GetStartupInfoA
WriteFile
ReadFile
CreateThread
PeekNamedPipe
Process32Next
FindNextFileA
CloseHandle
FindFirstFileA
TerminateProcess
OpenProcess
Process32First
MultiByteToWideChar
CreateToolhelp32Snapshot
DeleteFileW
GetPrivateProfileStringA
GetModuleFileNameW
WritePrivateProfileStringA
SetConsoleTitleA
WritePrivateProfileStringW
GetModuleFileNameA
GetModuleHandleA
CreateDirectoryA
DeleteFileA
Sleep
CopyFileA
FindResourceA
LoadResource
LockResource
SizeofResource
GetLocalTime
GetLongPathNameA
GetTempPathA
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
oleaut32
VariantClear
VariantChangeType
VariantInit
setupapi
SetupDiGetClassDevsA
SetupDiOpenDevRegKey
SetupDiGetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
oleacc
LresultFromObject
CreateStdAccessibleObject
advapi32
RegQueryValueExA
Sections
.text Size: 288KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ