Static task
static1
Behavioral task
behavioral1
Sample
2024-11-24_48d37f6fe39397a3f6b29980f1ae5356_icedid_ramnit.exe
Resource
win7-20241010-en
General
-
Target
2024-11-24_48d37f6fe39397a3f6b29980f1ae5356_icedid_ramnit
-
Size
912KB
-
MD5
48d37f6fe39397a3f6b29980f1ae5356
-
SHA1
89a40066e12c3a6375fcfc2d477c90cf01a61b98
-
SHA256
51270b0f996545827dfc0d477c11609b7ce11cf02f9549c407cf34e81da69f16
-
SHA512
3cb567aa4acf5115a28ae40ff7fd0bd6b16b5168225a43086546cb32c8dfa776ff54f6fdec8c135bd3776d4726a54a46b14e416177aa48a8e6218d75dc43db43
-
SSDEEP
24576:NVNxZoj8echseDZtwHCw8TXT0A+6ZcFS:9xZoj8eyseDZykT+KcU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-11-24_48d37f6fe39397a3f6b29980f1ae5356_icedid_ramnit
Files
-
2024-11-24_48d37f6fe39397a3f6b29980f1ae5356_icedid_ramnit.exe windows:4 windows x86 arch:x86
0cf90dc077ffa7c701f27307c34fb5ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
SetErrorMode
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
HeapAlloc
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
LeaveCriticalSection
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetACP
LCMapStringA
LCMapStringW
SetHandleCount
GetFileType
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
SetStdHandle
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LocalAlloc
GlobalFlags
GetFileTime
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetThreadLocale
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalAlloc
MulDiv
InterlockedDecrement
GetModuleFileNameW
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
lstrcmpW
GetVersionExA
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
FormatMessageA
LocalFree
GetCurrentDirectoryA
SetVolumeLabelA
GetDiskFreeSpaceA
GetDriveTypeA
MoveFileA
GetFileAttributesA
SetFileAttributesA
CreateFileA
GetFileSize
CloseHandle
GetVersion
CompareStringA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
DeleteFileA
GetTempPathA
lstrlenA
TerminateThread
SetThreadPriority
CreateThread
GlobalMemoryStatus
SetCurrentDirectoryA
Sleep
GetLongPathNameA
CreateDirectoryA
SetThreadLocale
SetPriorityClass
GetPriorityClass
GetCurrentProcess
FindResourceA
LoadResource
LockResource
SizeofResource
SetEnvironmentVariableA
WideCharToMultiByte
user32
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
IsWindowVisible
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
LoadIconA
SendMessageA
SetForegroundWindow
EnableWindow
GetWindowLongA
MessageBoxA
PtInRect
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
ReleaseDC
UnregisterClassA
LoadCursorA
GetSysColorBrush
GetClassLongA
EndPaint
GetSystemMenu
AppendMenuA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
ExitWindowsEx
MessageBeep
UpdateWindow
CreatePopupMenu
GetWindowRect
TrackPopupMenu
CharUpperA
OemToCharBuffA
CharToOemBuffA
GetDC
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetWindowTextLengthA
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 612KB - Virtual size: 608KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE