Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
c6fd676496700736b58581fff8d2b92e_icedid_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c6fd676496700736b58581fff8d2b92e_icedid_JC.exe
Resource
win10v2004-20230703-en
Target
c6fd676496700736b58581fff8d2b92e_icedid_JC.exe
Size
2.2MB
MD5
c6fd676496700736b58581fff8d2b92e
SHA1
eadb1d5080aacb8a312f7d4176465a8f8616b2c3
SHA256
ca740f952f81d171b09a502b551381d8e087316c3eff80d1702b5fc6214c09f4
SHA512
b62955f85672f33d3d9f1c732f674da1086911e6dc950a5527d98473eab3b2a0d0d2049908fdc39eaef2354a9a34ecd79b55130afab1c8cc73237f4f233a9f86
SSDEEP
49152:rB7qLbvdOLFs/m6WpyKppOmbu2uJ9ZvQLaJ6CN4T+u9xP:5qPywmy/k/H
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetCurrentDirectoryA
GetModuleHandleW
FindResourceExA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
InterlockedExchange
InterlockedDecrement
GetModuleFileNameW
FormatMessageA
LocalFree
VirtualProtect
GetPrivateProfileStringA
GetCurrentProcessId
MoveFileA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
MulDiv
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
SetLastError
MultiByteToWideChar
lstrcmpW
GlobalLock
GlobalUnlock
FreeResource
GetDriveTypeA
SetFilePointer
ReadFile
HeapFree
GetProcessHeap
HeapAlloc
FileTimeToLocalFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
lstrcatA
GlobalAlloc
GlobalFree
CreateToolhelp32Snapshot
Process32First
lstrcmpA
Process32Next
OpenProcess
FlushFileBuffers
SetEndOfFile
GetFullPathNameA
SetErrorMode
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetConsoleCP
GetConsoleMode
GetCommandLineA
GetStartupInfoA
RaiseException
ExitThread
CreateThread
HeapReAlloc
VirtualAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
GetACP
IsValidCodePage
GetTimeZoneInformation
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
CompareStringW
SetEnvironmentVariableA
GlobalMemoryStatus
lstrlenA
FindFirstFileA
FindNextFileA
FindClose
GetCurrentProcess
GetVersion
GetVersionExA
SystemTimeToFileTime
WriteFile
GetUserDefaultLCID
GetLocaleInfoA
LoadResource
LockResource
SizeofResource
FindResourceA
CompareFileTime
lstrcpyA
GetModuleHandleA
GetFileAttributesA
WideCharToMultiByte
GetPrivateProfileIntA
WritePrivateProfileStringA
DeviceIoControl
CreateProcessA
WaitForSingleObject
CreateMutexA
GetLastError
CreateDirectoryA
CopyFileA
SetFileTime
GetVolumeInformationA
FreeLibrary
GetComputerNameA
Sleep
GetModuleFileNameA
FileTimeToSystemTime
LoadLibraryA
SetFileAttributesA
DeleteFileA
CreateFileA
GetFileTime
CloseHandle
GetProcAddress
CreateEventA
RemoveDirectoryA
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
InternetOpenA
InternetConnectA
InternetReadFile
HttpQueryInfoA
InternetSetOptionA
InternetQueryOptionA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
GetWindowThreadProcessId
MapDialogRect
GetMessageA
ValidateRect
PeekMessageA
PostMessageA
FindWindowA
GetAsyncKeyState
GetKeyState
SendMessageA
MessageBoxA
GetCursorPos
DrawIcon
GetSubMenu
InsertMenuA
ModifyMenuA
RemoveMenu
LoadMenuA
GetSystemMenu
IsIconic
GetWindowRect
GetClientRect
UpdateWindow
IsWindowVisible
DestroyMenu
PostQuitMessage
SetCursor
GetSysColorBrush
LoadCursorA
TranslateMessage
DispatchMessageA
GetSystemMetrics
GetUserObjectInformationW
GetProcessWindowStation
UnregisterClassA
SetTimer
KillTimer
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
wsprintfA
FindWindowExA
EnumWindows
GetWindowTextA
GetParent
LoadIconA
EnableWindow
SetForegroundWindow
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
ScaleWindowExtEx
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
EnumFontFamiliesExA
SetWindowExtEx
DeleteDC
GetStockObject
GetDeviceCaps
SetMapMode
GetOpenFileNameA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegFlushKey
RegCloseKey
DeregisterEventSource
ReportEventA
RegisterEventSourceA
SHFileOperationA
Shell_NotifyIconA
SHGetSpecialFolderLocation
ShellExecuteA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecW
PathIsDirectoryA
CoUninitialize
CoCreateInstance
CoInitializeEx
CoTaskMemFree
VariantInit
VariantChangeType
VariantClear
MakeSureDirectoryPathExists
OPENSSL_Applink
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ