c:\build_area\flajector_src\current\src\Release\Projector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_3c5eeb41097cd45b452353fd8b05f3b6_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_3c5eeb41097cd45b452353fd8b05f3b6_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-28_3c5eeb41097cd45b452353fd8b05f3b6_icedid
-
Size
552KB
-
MD5
3c5eeb41097cd45b452353fd8b05f3b6
-
SHA1
caa512e60f1ecda1872c3ed783050082328be2ed
-
SHA256
debc4106bfbd6d1ff2a4070b595977674e42a1f3c5bbed56d389db1adb320b15
-
SHA512
90495f6648e8d25464f1f17232aece1b5cf4969cd9fae3bf9a720aa23a4f9e26c7e327631089fecb542172bfe770bb41bdc57acd34d81df30973afbc09c5e232
-
SSDEEP
12288:yaFCIs0UH8s/mKODpoS2CwH9PAiQIccjpODXjiv:yaJsjH8/KS2CwH9oiQkjpGXW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-28_3c5eeb41097cd45b452353fd8b05f3b6_icedid
Files
-
2024-01-28_3c5eeb41097cd45b452353fd8b05f3b6_icedid.exe windows:4 windows x86 arch:x86
d57b8a307af35ad3a2a6202317208aa6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStartupInfoA
GetCommandLineA
TerminateProcess
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
VirtualQuery
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetUserDefaultLCID
SetEnvironmentVariableA
GetSystemInfo
VirtualProtect
HeapFree
lstrcpyW
GetSystemDefaultLCID
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
FlushInstructionCache
HeapAlloc
ExitProcess
RtlUnwind
GetTickCount
GetFileTime
GetFileAttributesA
SetErrorMode
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
SetLastError
MulDiv
FormatMessageA
LocalFree
CreateEventA
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
lstrcpynA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetCurrentDirectoryA
CompareStringW
CompareStringA
lstrlenW
GetVersion
DeleteCriticalSection
InitializeCriticalSection
RaiseException
MultiByteToWideChar
GlobalSize
GlobalAlloc
GetCurrentThreadId
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetModuleFileNameA
GetCurrentProcess
DuplicateHandle
CreateThread
InterlockedDecrement
GetSystemTime
InterlockedIncrement
GetFileSize
SetFilePointer
CreateFileA
GetLastError
ReadFile
CloseHandle
lstrcmpiA
FreeLibrary
GetModuleHandleA
VirtualFree
VirtualAlloc
LoadLibraryA
GetProcAddress
lstrlenA
GetStringTypeA
lstrcatA
user32
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
DestroyMenu
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetWindowContextHelpId
MapDialogRect
GetMessageA
TranslateMessage
ValidateRect
SetCursor
PostQuitMessage
wsprintfA
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowTextA
IsDialogMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetWindowRect
EnableWindow
GetClientRect
DestroyAcceleratorTable
GetUpdateRect
RedrawWindow
CreateAcceleratorTableA
LookupIconIdFromDirectory
CreateIconFromResource
RegisterClassExA
IsWindowUnicode
LoadMenuIndirectA
GetDesktopWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
PostThreadMessageA
SetTimer
KillTimer
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
GetClassInfoA
SetCapture
GetParent
GetCursorPos
ReleaseCapture
MoveWindow
UpdateWindow
ShowWindow
CreateWindowExA
MessageBoxA
CallNextHookEx
PostMessageA
GetAsyncKeyState
SendMessageA
LoadIconA
GetWindowLongA
SetWindowsHookExA
SetWindowPos
SetWindowLongA
RegisterWindowMessageA
CharUpperA
UnregisterClassA
EndDialog
GetNextDlgTabItem
IsWindowEnabled
GetDlgItem
IsWindow
DestroyWindow
CreateDialogIndirectParamA
GetSystemMetrics
SetActiveWindow
GetActiveWindow
GetWindow
PtInRect
CopyRect
GetWindowPlacement
IsIconic
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
ReleaseDC
gdi32
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
CreateSolidBrush
GetStockObject
CreateCompatibleDC
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
CreateCompatibleBitmap
CombineRgn
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
GetWindowExtEx
GetViewportExtEx
SelectClipRgn
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateDCA
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateDIBSection
PtInRegion
CreateRectRgn
SelectObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyA
RegEnumKeyA
RegCloseKey
RegQueryValueA
RegOpenKeyA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CreateStreamOnHGlobal
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoGetInterfaceAndReleaseStream
CoUninitialize
CreateILockBytesOnHGlobal
CoCreateInstance
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoCreateGuid
OleLockRunning
oleaut32
SysStringLen
SysFreeString
SysAllocStringByteLen
SysStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
OleCreateFontIndirect
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
SysAllocString
Exports
Exports
_EXECryptor_AntiDebug@0
_EXECryptor_DecodeSerialNumber@16
_EXECryptor_DecodeSerialNumberW@16
_EXECryptor_DecryptStr@8
_EXECryptor_DecryptStrW@8
_EXECryptor_EncryptStr@8
_EXECryptor_EncryptStrW@8
_EXECryptor_GetDate@0
_EXECryptor_GetEXECryptorVersion@0
_EXECryptor_GetHardwareID@0
_EXECryptor_GetProcAddr@8
_EXECryptor_GetReleaseDate@0
_EXECryptor_GetTrialDaysLeft@4
_EXECryptor_GetTrialRunsLeft@4
_EXECryptor_IsAppProtected@0
_EXECryptor_IsRegistered@0
_EXECryptor_MessageBoxA@16
_EXECryptor_ProtectImport@0
_EXECryptor_RegConst_0@0
_EXECryptor_RegConst_1@0
_EXECryptor_RegConst_2@0
_EXECryptor_RegConst_3@0
_EXECryptor_RegConst_4@0
_EXECryptor_RegConst_5@0
_EXECryptor_RegConst_6@0
_EXECryptor_RegConst_7@0
_EXECryptor_SecureRead@8
_EXECryptor_SecureReadW@8
_EXECryptor_SecureWrite@8
_EXECryptor_SecureWriteW@8
_EXECryptor_VerifySerialNumber@16
_EXECryptor_VerifySerialNumberW@16
Sections
.text Size: 296KB - Virtual size: 292KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ