Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_3fdf37e489543ccd3461a72cc81f92f7_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-08_3fdf37e489543ccd3461a72cc81f92f7_icedid.exe
Resource
win10v2004-20231222-en
Target
2024-01-08_3fdf37e489543ccd3461a72cc81f92f7_icedid
Size
1.3MB
MD5
3fdf37e489543ccd3461a72cc81f92f7
SHA1
7c5e92d74729b5844695294804734b0352078c9d
SHA256
c7a0163d0b020f6a5ec0c2cd0884dcfca9c3d6fa332fbd6df79c594dbba0ffba
SHA512
364347ef2cad1353ef2eb59a56c7b7b5c2f541c0a5c53b7eb78d76b57ffca2db41d30b5b2b6a181f472e53c8a0e91c5e60e1d69a4b3c461462a7cf123f2d1931
SSDEEP
24576:t2Cm5dIIJt+TBRXco6mKGSMpcrUynuVbcc5FAhq4tVY+6VTX8:t2WI7+TBRXcoVaUynMZbAhJTQT
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentThread
GetUserDefaultLCID
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
GetFileTime
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
HeapAlloc
HeapFree
VirtualAlloc
VirtualQuery
RtlUnwind
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
lstrcmpA
ExitThread
CreateThread
SetEnvironmentVariableA
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
IsBadReadPtr
IsBadCodePtr
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetStdHandle
GetLocaleInfoW
GetProcessHeap
ConvertDefaultLocale
EnumResourceLanguagesA
GetVolumeInformationA
DuplicateHandle
UnlockFile
LockFile
FlushFileBuffers
lstrcpyA
FileTimeToLocalFileTime
FileTimeToSystemTime
WritePrivateProfileStringA
InterlockedDecrement
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
InterlockedIncrement
FreeResource
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
SetVolumeLabelA
GetDiskFreeSpaceA
GetDriveTypeA
MoveFileA
SetEndOfFile
SetFileAttributesA
SetFilePointer
QueryPerformanceCounter
QueryPerformanceFrequency
WaitForMultipleObjects
LeaveCriticalSection
EnterCriticalSection
GetFullPathNameA
FormatMessageA
LocalFree
GetModuleFileNameA
GetFileAttributesA
CreateDirectoryA
VirtualProtect
SetErrorMode
SetUnhandledExceptionFilter
GetCurrentThreadId
GetCurrentProcess
RemoveDirectoryA
SetEvent
GetCurrentProcessId
CreateEventA
FindResourceExA
CreateProcessA
Process32First
TerminateProcess
GetExitCodeProcess
Process32Next
CreateToolhelp32Snapshot
Module32First
Module32Next
GetSystemDirectoryA
LoadLibraryA
FreeLibrary
GetFileSize
CopyFileA
CreateMutexA
SetCurrentDirectoryA
ReadFile
ReleaseMutex
ExitProcess
OpenProcess
WaitForSingleObject
OutputDebugStringA
GetSystemInfo
GlobalMemoryStatusEx
GlobalMemoryStatus
GetLocalTime
WriteFile
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
Sleep
CreateFileA
CloseHandle
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleHandleA
GetProcAddress
MulDiv
GetTickCount
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetCommandLineA
InterlockedExchange
GetSystemTime
PostThreadMessageA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
MessageBoxA
GetKeyState
UpdateWindow
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
GetDlgCtrlID
CallWindowProcA
IntersectRect
GetWindowPlacement
GetWindow
CharNextA
GetActiveWindow
CreateDialogIndirectParamA
IsWindow
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
OemToCharBuffA
SetRectEmpty
wvsprintfA
SetWindowTextA
LoadCursorA
FrameRect
InflateRect
IsRectEmpty
SetWindowRgn
GetSysColor
SetCapture
ReleaseCapture
SystemParametersInfoA
SetCursor
GetCursorPos
ScreenToClient
PtInRect
OffsetRect
EqualRect
LoadImageA
FindWindowA
SetActiveWindow
SetWindowPos
OpenIcon
SetTimer
SendMessageTimeoutA
KillTimer
GetDlgItem
ShowWindow
SetFocus
GetDC
GetDesktopWindow
ReleaseDC
wsprintfA
GetParent
CharUpperA
MessageBeep
DestroyMenu
InvalidateRgn
CopyAcceleratorTableA
SetRect
GetSysColorBrush
EnableMenuItem
ClientToScreen
GetWindowRect
CreateWindowExA
DefWindowProcA
PeekMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
SetForegroundWindow
LoadAcceleratorsA
GetSystemMetrics
GetWindowLongA
SetWindowLongA
LoadIconA
EnableWindow
RedrawWindow
IsWindowVisible
InvalidateRect
GetUpdateRect
GetClientRect
IsIconic
SendMessageA
DrawIcon
CopyRect
PostMessageA
UnregisterClassA
RegisterClipboardFormatA
GetNextDlgGroupItem
MoveWindow
SetWindowContextHelpId
MapDialogRect
GetMessageA
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
ModifyMenuA
WinHelpA
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsDialogMessageA
CheckDlgButton
CharToOemBuffA
RegisterWindowMessageA
SetBkColor
CreateBitmap
SaveDC
RestoreDC
SetBkMode
SetMapMode
GetViewportExtEx
GetWindowExtEx
PtVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetTextColor
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreateRectRgnIndirect
GetMapMode
GetRgnBox
GetClipBox
GetTextColor
GetBkColor
GetDIBits
CreateBrushIndirect
FrameRgn
CreateRoundRectRgn
CreatePolygonRgn
GetStockObject
GetObjectA
RectVisible
SetDIBitsToDevice
StretchDIBits
SelectClipRgn
CreateRectRgn
GetTextExtentPoint32A
CreateCompatibleDC
GetDeviceCaps
CreateDIBSection
SelectObject
DeleteObject
DeleteDC
BitBlt
CreateSolidBrush
CreateFontA
GetFileTitleA
DocumentPropertiesA
OpenPrinterA
ClosePrinter
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegDeleteValueA
ShellExecuteA
ord17
PathIsUNCA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
ord8
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoDisconnectObject
CoGetClassObject
StgOpenStorageOnILockBytes
CoTaskMemFree
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
SysFreeString
SysAllocStringByteLen
SysAllocStringLen
OleCreateFontIndirect
VariantClear
VariantChangeType
VariantInit
VariantCopy
SysAllocString
DispCallFunc
LoadRegTypeLi
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
SafeArrayDestroy
SystemTimeToVariantTime
LoadTypeLi
SysStringLen
WSASocketA
WSAEventSelect
WSACloseEvent
ntohl
sendto
WSAEnumNetworkEvents
gethostname
ntohs
getservbyport
gethostbyaddr
getservbyname
accept
recv
shutdown
inet_addr
gethostbyname
WSACreateEvent
inet_ntoa
connect
ioctlsocket
WSAAsyncSelect
setsockopt
send
WSACleanup
closesocket
recvfrom
bind
htons
htonl
socket
WSAStartup
WSAGetLastError
DirectDrawCreate
HttpOpenRequestA
InternetSetStatusCallback
HttpQueryInfoA
InternetSetOptionA
InternetCrackUrlA
InternetConnectA
InternetCloseHandle
HttpSendRequestA
InternetReadFile
InternetSetCookieA
InternetOpenA
InternetOpenUrlA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ