Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
0da10227b05f29a173d83ae043f1fbad_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0da10227b05f29a173d83ae043f1fbad_icedid_JC.exe
Resource
win10v2004-20230703-en
Target
0da10227b05f29a173d83ae043f1fbad_icedid_JC.exe
Size
1.1MB
MD5
0da10227b05f29a173d83ae043f1fbad
SHA1
bfe59569defb827d674461f3a3f26966f5d88e34
SHA256
b1ba0827bde37ad202550add45cc0f25e380863214952fb93df42a9aa8376188
SHA512
fc7b284f2d67abf5f9158a8af3b00f1ef1b2474611d7df91c5c7d53d68b8f4a40c9960ee2a9d4134b398f8d4a2983a49524ca4268cbc0434dc69b58efb02a490
SSDEEP
6144:je3B4adF36oLOwFalUYCZfavDJTjrTvgCaiK+uN87Iwr3eV9z6Tk6kD55JwOVkPL:y3B4adF31OwFaBSivJ6i+KkuaWhbKE
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LocalReAlloc
TlsFree
InterlockedIncrement
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
HeapFree
HeapAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
ExitProcess
RtlUnwind
HeapReAlloc
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
TerminateProcess
SetStdHandle
GetFileType
HeapSize
TlsSetValue
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetTimeZoneInformation
IsBadCodePtr
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
GetLocaleInfoW
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
WritePrivateProfileStringA
VirtualProtect
GlobalGetAtomNameA
lstrcmpW
InterlockedDecrement
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
GetCurrentThreadId
GlobalDeleteAtom
GlobalAddAtomA
GlobalFindAtomA
GetCommandLineA
GetFileTime
CreateFileA
GetCurrentProcess
CloseHandle
WaitForSingleObject
GetTempPathA
CreateDirectoryA
SetLastError
FindClose
FindFirstFileA
GetUserDefaultLCID
FreeResource
lstrcatA
WinExec
GetFileAttributesA
GetWindowsDirectoryA
lstrcpyA
IsBadReadPtr
GetProcAddress
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
FormatMessageA
LocalFree
GetLongPathNameA
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersion
GetVersionExA
DeleteCriticalSection
CompareStringA
GetThreadLocale
lstrcmpiA
GetLastError
InterlockedExchange
RaiseException
lstrlenW
MultiByteToWideChar
GetACP
CompareStringW
WideCharToMultiByte
InitializeCriticalSection
GetLocaleInfoA
lstrlenA
HeapDestroy
DestroyMenu
wsprintfA
WindowFromPoint
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
MoveWindow
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetForegroundWindow
SetActiveWindow
GetDlgItem
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
CallWindowProcA
SetWindowPos
IsIconic
GetWindowPlacement
CopyRect
GetLastActivePopup
CallNextHookEx
GetActiveWindow
PeekMessageA
ValidateRect
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
LoadIconA
DispatchMessageA
TranslateMessage
GetWindowTextLengthA
GetMessageA
UpdateWindow
ShowWindow
DefWindowProcA
PostQuitMessage
SetForegroundWindow
SetFocus
CreateWindowExA
GetClassInfoExA
GetTopWindow
FindWindowA
SetWindowTextA
GetDesktopWindow
GetDlgCtrlID
GetWindowLongA
GetClassNameA
GetWindowTextA
IsWindowEnabled
IsDialogMessageA
IsWindowVisible
MapDialogRect
GetWindow
KillTimer
GetCursorPos
SetWindowLongA
SetTimer
MessageBeep
CopyIcon
DestroyCursor
SetCursor
RedrawWindow
GetWindowRect
DrawFocusRect
InflateRect
SetRectEmpty
PtInRect
MessageBoxA
GetKeyState
WinHelpA
GetParent
GetFocus
UnhookWindowsHookEx
ScreenToClient
PostMessageA
SendMessageA
GetSystemMetrics
SystemParametersInfoA
GetSysColor
EnableWindow
ReleaseCapture
GetSysColorBrush
LoadCursorA
IsWindow
DestroyWindow
SetCapture
InvalidateRect
ReleaseDC
GetDC
GetClientRect
OffsetRect
CharUpperA
UnregisterClassA
SetWindowsHookExA
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
RectVisible
PtVisible
CreateFontIndirectA
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
DeleteObject
SelectObject
GetTextExtentPointA
SetTextJustification
TextOutA
GetStockObject
GetObjectA
GetTextExtentPoint32A
GetFileTitleA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyA
RegCloseKey
RegQueryInfoKeyA
RegDeleteKeyA
RegEnumValueA
ShellExecuteA
ord17
PathIsDirectoryA
SHCopyKeyA
SHDeleteKeyA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
CoInitialize
CoCreateInstance
CoUninitialize
VariantInit
VariantChangeType
VariantClear
SysFreeString
SysAllocStringLen
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
ord17
ord124
ord103
ord8
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE