InitSecureLog
SaveSecureLog
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_8a5f5eb75668a5110003a6718414a891_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_8a5f5eb75668a5110003a6718414a891_icedid_JC.exe
Resource
win10v2004-20230831-en
Target
2023-08-22_8a5f5eb75668a5110003a6718414a891_icedid_JC.exe
Size
1.7MB
MD5
8a5f5eb75668a5110003a6718414a891
SHA1
639ccc6ac891a678100c240ac4bf965b853cd086
SHA256
1372445af5da7b3ddc6bf6b318c0bc8e1a1a15a84f13180e036fc9fa88f00d4a
SHA512
910689748a1bf7d43ff20400fd943cce1a4c08c733098e27eb2e8d2b48029a275f4549324dd5e5ad7a456149bdba47280bd09d89e6161fcaa3261164b6989858
SSDEEP
24576:tlKrjyiU1/nMJ/PG5oTy16MN3gMwa6TV7rxv5WV7xEeWqOweTXx5qfNjt8JcO00c:XwJTy8MGT6++hBuU/dcTwws
Checks for missing Authenticode signature.
resource |
---|
2023-08-22_8a5f5eb75668a5110003a6718414a891_icedid_JC.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
VirtualQuery
ExitThread
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
ExitProcess
GetConsoleCP
GetConsoleMode
GetSystemTimeAsFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetTimeFormatA
GetDateFormatA
HeapSize
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetACP
SetHandleCount
GetStartupInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
SetEnvironmentVariableA
FlushFileBuffers
VerSetConditionMask
VerifyVersionInfoA
GetCommandLineA
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
InterlockedExchange
RaiseException
HeapReAlloc
GetFileAttributesA
GetFullPathNameA
SetEndOfFile
UnlockFile
LockFile
SetFilePointer
MoveFileA
GetCurrentThreadId
GetModuleFileNameA
GetFileAttributesExA
GetDiskFreeSpaceExA
CreateProcessA
GetExitCodeProcess
GetLocalTime
GetComputerNameExA
lstrcatA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
ReadFile
GlobalMemoryStatus
GetPrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileStringA
GetComputerNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetQueuedCompletionStatus
CreateIoCompletionPort
ProcessIdToSessionId
GetVersionExA
HeapAlloc
HeapFree
GetVersionExW
lstrcpyW
LoadLibraryW
SetLastError
WriteFile
GetCurrentProcessId
DuplicateHandle
GetCurrentThread
GetThreadSelectorEntry
MapViewOfFile
UnmapViewOfFile
GetLogicalDrives
GetVolumeInformationA
LocalFree
LocalAlloc
LocalReAlloc
FindClose
FindNextFileA
lstrcpyA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateDirectoryA
GetModuleHandleA
GetProcessHeap
CreateThread
SetThreadPriority
ResumeThread
CreateToolhelp32Snapshot
LoadLibraryA
GetProcAddress
Process32First
GetWindowsDirectoryA
GetLongPathNameA
Process32Next
FreeLibrary
EnterCriticalSection
GetOEMCP
GetCPInfo
GlobalFlags
GlobalAddAtomA
GlobalFindAtomA
lstrcmpW
GetThreadLocale
GlobalGetAtomNameA
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
OpenProcess
TerminateProcess
GetLogicalDriveStringsA
QueryDosDeviceA
GetDriveTypeA
DeviceIoControl
CreateFileA
GetSystemDirectoryA
DeleteCriticalSection
InitializeCriticalSection
GetComputerNameExW
OutputDebugStringA
GetCurrentProcess
GlobalAlloc
GlobalFree
lstrcmpA
GetSystemInfo
CreateEventA
WaitForSingleObject
lstrlenA
CompareStringW
CompareStringA
lstrlenW
CloseHandle
GetTickCount
Sleep
SetEvent
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
GetLastError
GetModuleFileNameW
WideCharToMultiByte
MultiByteToWideChar
VirtualAlloc
FormatMessageA
GlobalUnlock
GlobalLock
SuspendThread
SetErrorMode
GlobalDeleteAtom
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
TlsFree
SystemParametersInfoA
SetWindowPos
SetWindowLongA
CallWindowProcA
GetDlgCtrlID
PtInRect
CopyRect
AdjustWindowRectEx
RegisterClassA
GetClassInfoA
GetClassInfoExA
GetMenu
GetClientRect
SetForegroundWindow
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
GetDlgItem
GetForegroundWindow
IsWindow
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassLongA
GetCapture
IsIconic
WinHelpA
LoadIconA
RegisterWindowMessageA
SetWindowTextA
ShowWindow
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
ClientToScreen
UnregisterClassA
DestroyMenu
GetSubMenu
DispatchMessageA
TranslateMessage
PeekMessageA
IsWindowEnabled
EnableWindow
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetLastActivePopup
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetWindowTextA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
PostMessageA
PostQuitMessage
GetWindowThreadProcessId
GetParent
GetWindowLongA
wsprintfA
GetSystemMetrics
DefWindowProcA
EndPaint
BeginPaint
GetMessageA
CreateWindowExA
RegisterClassExA
SetCursor
LoadCursorA
SendMessageA
wsprintfW
MessageBoxA
GetMenuItemID
GetMenuState
ValidateRect
GetMenuItemCount
GetModuleFileNameExA
EnumProcessModules
NetUserGetInfo
NetUserModalsGet
NetUserGetLocalGroups
DsRoleFreeMemory
DsRoleGetPrimaryDomainInformation
NetLocalGroupGetInfo
NetGroupGetInfo
DsEnumerateDomainTrustsA
NetApiBufferFree
NetShareGetInfo
NetShareEnum
NetShareAdd
NetShareDel
EqualSid
CloseServiceHandle
DeleteService
ControlService
OpenServiceA
OpenSCManagerA
StartServiceA
CreateServiceA
ChangeServiceConfigA
AdjustTokenPrivileges
LookupPrivilegeValueA
InitializeSid
GetSidIdentifierAuthority
GetSidLengthRequired
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
EnumServicesStatusA
RegQueryInfoKeyA
RegEnumKeyExA
SetSecurityDescriptorDacl
SetEntriesInAclA
LookupAccountNameA
RegCloseKey
RegOpenKeyExA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
GetSidSubAuthorityCount
GetSidSubAuthority
InitializeSecurityDescriptor
InitializeAcl
LogonUserW
RegDeleteValueA
SetFileSecurityA
RegDeleteKeyA
RegOpenKeyA
DuplicateTokenEx
SetServiceStatus
QueryServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
CreateProcessAsUserA
SetTokenInformation
IsValidSid
ConvertSidToStringSidA
GetLengthSid
ConvertStringSidToSidW
RegQueryValueA
RegEnumKeyA
ConvertStringSidToSidA
CoInitialize
CoCreateInstance
CoUninitialize
SysFreeString
SafeArrayUnaccessData
SafeArrayAccessData
VariantClear
VariantInit
VarBstrCat
SysStringLen
SysAllocString
SysAllocStringLen
VariantChangeType
gethostbyname
WSAStartup
shutdown
WSACleanup
gethostname
inet_addr
ioctlsocket
ntohs
select
inet_ntoa
socket
getservbyport
closesocket
__WSAFDIsSet
WSAGetLastError
ntohl
accept
recv
send
setsockopt
bind
connect
htons
htonl
listen
GetAdaptersInfo
SendARP
GetIpNetTable
GetTcpTable
GetUdpTable
WTSEnumerateProcessesA
WTSWaitSystemEvent
WTSSendMessageA
WTSDisconnectSession
WTSEnumerateSessionsA
WTSQueryUserToken
WTSQuerySessionInformationA
WTSFreeMemory
Redwall_GetInPolicy
Redwall_SetInPolicy
Redwall_SetOutPolicy
Redwall_Stop
Redwall_SetFilter
Redwall_GetFilter
Redwall_IsStarted
Redwall_Start
Redwall_SetRules
ord1
ord2
Redwall_IsInstalled
Redwall_GetShareEnum
Redwall_GetOutPolicy
Init_ITopManList
cmdfunc
RemoveAll_ITopsNode
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
ord82
ord2708
ord3212
ord246
ord66
ord395
ord641
ord55
ord37
ord30
ord5
ord6
ord4
ord18
ord9
ord3
ord87
ord1
ord8
ord15
ord176
ord24
ord30
ord235
ord6
ord12
ord111
ord170
ord117
ord114
ord48
ord96
ord58
ord35
ord75
ord78
ord108
ord43
ord183
PathFindExtensionA
PathFindFileNameA
CreateEnvironmentBlock
DestroyEnvironmentBlock
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetWindowExtEx
GetStockObject
DeleteDC
ScaleWindowExtEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
SetMapMode
GetDeviceCaps
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
OpenPrinterA
DocumentPropertiesA
ClosePrinter
InitSecureLog
SaveSecureLog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ