Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-27_4b8dada9e7554db1c7baabd51c3c1a8f_icedid_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-27_4b8dada9e7554db1c7baabd51c3c1a8f_icedid_JC.exe
Resource
win10v2004-20230915-en
Target
2023-08-27_4b8dada9e7554db1c7baabd51c3c1a8f_icedid_JC.exe
Size
233KB
MD5
4b8dada9e7554db1c7baabd51c3c1a8f
SHA1
bf417c0957a7e6a78bee21feb3665188e86711d7
SHA256
30da6e67bef0cd17cd70e859ce3a1da939fef29483c7a4a55ba0dae9511fd11d
SHA512
30005300643ba4c7900f36ad9185a37a72143de4b31a36f7ef8813360cb8a3c997dc22782c4e630dc6f2894e09ba2f8e39da4e08e8db8ecf3f3a183038a7d74e
SSDEEP
3072:obYyf4fDZmSn6lJxKsCUuVF4IR7AkPczV0zWh4aobJB9RlKUnoN6Z3ZiH1ovCNMi:o+fDZmm63xKsYVN7sV0S1zj03i
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
InternetGetConnectedState
ExitProcess
HeapSize
GetACP
IsValidCodePage
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
HeapReAlloc
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
GetExitCodeProcess
CreateProcessA
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
VirtualAlloc
HeapFree
HeapAlloc
RaiseException
RtlUnwind
GetFileAttributesA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
InterlockedIncrement
GetModuleHandleW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
SetErrorMode
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
InterlockedDecrement
GetModuleFileNameW
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrlenA
GetCurrentProcess
LocalFree
TerminateProcess
OpenProcess
GetCommandLineA
GetModuleHandleA
CreateEventA
CreateThread
WaitForSingleObject
Beep
GetLastError
GetSystemDirectoryA
GetLocalTime
LoadLibraryA
GetProcAddress
FreeLibrary
SetEvent
Sleep
GetModuleFileNameA
MultiByteToWideChar
GetVersionExA
CreateDirectoryA
GetShortPathNameA
CopyFileA
CreateFileA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
CloseHandle
GetTickCount
SetCursor
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowTextA
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowThreadProcessId
IsWindowEnabled
LoadCursorA
GetDC
ReleaseDC
GetSysColorBrush
PostQuitMessage
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
GetPropA
RemovePropA
GetFocus
IsWindow
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
GetKeyState
SetMenu
EnableWindow
SetForegroundWindow
IsWindowVisible
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
GetParent
GetDlgCtrlID
SendMessageA
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
GetWindowLongA
SetWindowLongA
SetWindowPos
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetSysColor
SystemParametersInfoA
GetSystemMetrics
DestroyMenu
CopyRect
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
CreateDialogParamA
DialogBoxParamA
SetTimer
ShowWindow
GetCursorPos
KillTimer
LoadMenuA
GetSubMenu
MessageBoxA
SetPropA
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetDeviceCaps
DeleteObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
ExtTextOutA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegDeleteKeyA
RegQueryValueA
RegOpenKeyExA
RegDeleteValueA
AllocateAndInitializeSid
SetEntriesInAclA
SetNamedSecurityInfoA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
FreeSid
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
EnumServicesStatusA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
StartServiceA
SetServiceStatus
RegOpenKeyA
RegCloseKey
RegEnumKeyA
Shell_NotifyIconA
PathFindExtensionA
PathFindFileNameA
CoInitialize
CoCreateInstance
VariantClear
VariantChangeType
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE