Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_8f318c9e153a121be5b160c87b06b97d_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_8f318c9e153a121be5b160c87b06b97d_icedid.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_8f318c9e153a121be5b160c87b06b97d_icedid
-
Size
514KB
-
MD5
8f318c9e153a121be5b160c87b06b97d
-
SHA1
dd6d055d67ab386a013ba6954f7259eddf3c906a
-
SHA256
3a30ac4d5ecd1f5c6242fc1f90698a89c037a254a1254fa686d96f7968b5f945
-
SHA512
2f78d0e8962236cc3bdd880d784dee384185c5dfee73a1ef9b4da6d20225d41a888a924b1e29f103e294ab279baf9bae3d84fe70a74439bc12b31c9ce3b0b348
-
SSDEEP
6144:V35xB8mNj/uWrQ6xrfAc9+OcXMFrsj9gH4S+RQOoV+EH0nQGg96h3YpKfTC:V3aQj/Nff9+Jj9S4S+sVWDg96nTC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-09_8f318c9e153a121be5b160c87b06b97d_icedid
Files
-
2024-10-09_8f318c9e153a121be5b160c87b06b97d_icedid.exe windows:5 windows x86 arch:x86
2737ba80206e89e4d4398057f167419b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetSpecialFolderPathA
kernel32
GetModuleHandleW
SetErrorMode
RtlUnwind
RaiseException
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
VirtualAlloc
HeapReAlloc
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetOEMCP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetDriveTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetCPInfo
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
lstrcmpA
InterlockedDecrement
GetModuleFileNameW
GetFullPathNameA
FindFirstFileA
FindClose
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentProcessId
FormatMessageA
LocalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
MultiByteToWideChar
lstrcmpW
GetVersionExA
MulDiv
SetLastError
GetProcAddress
LoadLibraryA
CreateThread
GetCurrentDirectoryA
Sleep
FreeLibrary
WaitForSingleObject
CreateMutexA
CreateDirectoryA
ReleaseMutex
CreateProcessA
GetFileAttributesA
CopyFileA
OutputDebugStringA
GetTickCount
GetModuleHandleA
lstrlenA
GetPrivateProfileIntA
GetPrivateProfileStructA
WritePrivateProfileStructA
WritePrivateProfileStringA
GetLastError
GetPrivateProfileStringA
CreateFileA
GetFileSize
ReadFile
CloseHandle
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalReAlloc
GlobalFree
GetModuleFileNameA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetStdHandle
user32
DestroyMenu
SetCursor
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
IsWindowEnabled
SetWindowTextA
IsDialogMessageA
GetMenuState
SendDlgItemMessageA
WinHelpA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextLengthA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
SetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
GetClassInfoExA
GetClassInfoA
AdjustWindowRectEx
GetScrollInfo
SetScrollInfo
GetDlgCtrlID
DefWindowProcA
GetMenu
SystemParametersInfoA
GetWindowPlacement
EndPaint
BeginPaint
FrameRect
GrayStringA
DrawTextExA
TabbedTextOutA
RegisterWindowMessageA
SetScrollPos
BringWindowToTop
SetWindowPos
ShowWindow
ShowScrollBar
GetClientRect
SendMessageA
LoadStringA
PostMessageA
LoadCursorA
RegisterClassA
LoadIconA
DrawIcon
GetWindow
IsWindowVisible
GetDesktopWindow
GetWindowThreadProcessId
IsIconic
MoveWindow
SetForegroundWindow
UnregisterClassA
GetSysColorBrush
EnableWindow
GetParent
ClientToScreen
GetDC
ReleaseDC
InvalidateRect
GetActiveWindow
SetActiveWindow
GetCapture
SetCapture
WindowFromPoint
GetWindowLongA
ReleaseCapture
GetSysColor
GetCursorPos
SetWindowRgn
RedrawWindow
SetRect
CopyRect
InflateRect
LoadBitmapA
UpdateWindow
DrawTextA
PtInRect
KillTimer
SetTimer
GetWindowRect
GetFocus
FindWindowA
CreateWindowExA
SetFocus
SetWindowLongA
GetWindowTextA
DestroyWindow
CallWindowProcA
TrackMouseEvent
IsWindow
GetSystemMetrics
ScreenToClient
DrawEdge
FillRect
GetKeyState
gdi32
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
CreateBitmap
GetDeviceCaps
CreatePen
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
SelectClipRgn
BitBlt
CreateCompatibleDC
DeleteObject
MoveToEx
LineTo
GetClipBox
SetMapMode
SetBkColor
RestoreDC
SaveDC
CreateRectRgn
CreateFontIndirectA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetCurrentObject
GetTextMetricsA
SetBkMode
SetTextColor
CreateSolidBrush
GetStockObject
StretchBlt
GetObjectA
CreateDIBSection
SelectObject
ExtCreateRegion
CombineRgn
GetTextExtentPoint32A
CreateCompatibleBitmap
CreateFontA
DeleteDC
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyA
shlwapi
PathFindExtensionA
PathRemoveFileSpecW
PathFindFileNameA
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 322KB - Virtual size: 322KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ