Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
43664797b4bc341004ce17540658d3e0_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
43664797b4bc341004ce17540658d3e0_icedid_JC.exe
Resource
win10v2004-20230703-en
Target
43664797b4bc341004ce17540658d3e0_icedid_JC.exe
Size
595KB
MD5
43664797b4bc341004ce17540658d3e0
SHA1
0fbaf7fce6b1acb153d257e05b2ce065675fa23f
SHA256
e4d9526ce8ff01c962861b8b1ef77904639fbfdac0835f8d0d3ec8d1bc2789e8
SHA512
9170bb1c3533c91856a62135d731cb5d6d231b83a07b4affd1e9566dbe54aaa82d03623fa2e2531b02555627f86d92c9a6dc055dd319388783da92260133867d
SSDEEP
12288:9ODNr3wjOGM0ohNVW1n4mpooLK6HiwNJjB:9yT3sn4mpNLK6HiuF
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ReadFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
GetVolumeInformationW
GetFullPathNameW
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
GetThreadLocale
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
VirtualAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetCurrentDirectoryA
GetDriveTypeA
CreateFileA
SetEnvironmentVariableA
GlobalMemoryStatus
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetFileAttributesW
SetFileTime
LocalFileTimeToFileTime
GetModuleHandleA
WritePrivateProfileStringW
InterlockedDecrement
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
GlobalAlloc
FormatMessageW
LocalFree
MulDiv
FindFirstFileW
FindNextFileW
FindClose
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
SetLastError
GetModuleHandleW
GetVersionExA
SetFileAttributesW
GetFileTime
MoveFileW
GetSystemTime
lstrcmpW
GetModuleFileNameW
GetLogicalDrives
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CreateDirectoryW
WriteFile
SetFilePointerEx
GetLocalTime
GetTickCount
GetVersionExW
GetProcAddress
OpenMutexW
GetDriveTypeW
CloseHandle
DeviceIoControl
GetExitCodeThread
CreateFileW
SystemTimeToFileTime
MultiByteToWideChar
lstrlenA
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
lstrlenW
Sleep
GetTempPathW
CreateThread
LoadLibraryW
FindResourceW
LoadResource
LockResource
SizeofResource
lstrcpyW
WideCharToMultiByte
FreeLibrary
CopyFileW
SetHandleCount
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
IsWindowEnabled
GetNextDlgTabItem
EndDialog
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetSysColorBrush
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetWindowLongW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
ModifyMenuW
GetMenuState
CheckMenuItem
SystemParametersInfoW
AttachThreadInput
GetForegroundWindow
GetWindowThreadProcessId
wsprintfW
WaitForInputIdle
IsIconic
GetClassNameW
EnumWindows
MessageBoxW
EnableWindow
GetWindowRect
UnregisterClassA
MessageBoxIndirectA
BringWindowToTop
EndPaint
UpdateWindow
LoadIconW
DrawIcon
GetClientRect
GetSystemMetrics
GetClassInfoW
KillTimer
GetKeyState
SetTimer
PostMessageW
EnableMenuItem
GetSystemMenu
SendMessageW
ReleaseDC
UnregisterClassW
CharUpperW
SetForegroundWindow
GetDC
GetSysColor
LoadCursorW
BeginPaint
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetCursor
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
DestroyMenu
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
RegisterClassW
GetCapture
SaveDC
RestoreDC
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutW
Escape
SelectObject
SetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ExtTextOutW
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
OffsetViewportOrgEx
GetDeviceCaps
ClosePrinter
DocumentPropertiesW
OpenPrinterW
RegEnumKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyExW
RegDeleteKeyW
RegOpenKeyW
GetUserNameW
RegCloseKey
RegQueryValueExW
SHGetPathFromIDListW
ShellExecuteW
SHGetSpecialFolderLocation
InitCommonControlsEx
HashData
PathFileExistsW
PathFindFileNameW
PathFindExtensionW
PathStripToRootW
PathIsDirectoryW
PathIsUNCW
VariantInit
VariantChangeType
VariantClear
HttpQueryInfoW
InternetReadFile
HttpQueryInfoA
InternetSetOptionW
InternetQueryOptionW
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ