d:\MyProjects\fq\Release\Flower Quest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_00e3edf8d7f55608fea8a68cebd230c3_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_00e3edf8d7f55608fea8a68cebd230c3_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-04_00e3edf8d7f55608fea8a68cebd230c3_icedid
-
Size
568KB
-
MD5
00e3edf8d7f55608fea8a68cebd230c3
-
SHA1
fc27e4ba6cc7420b5fbe8b419d47897ceb6cd492
-
SHA256
7069c558c368bfc9e44829375212476ba78d739e2e2daa13248a91554b2f0792
-
SHA512
aeb1851a60c4b40051bf972615e0ac24cf9d78b25d179ecabded9ba9af05fbfc20fa3e01db2fd50bd682d98dffa82d63f9fd6196acaa57ece36ec2e8dac7628e
-
SSDEEP
12288:o9btFKQsTZ5hzLwES+GYjitNqCkSJrBb0sTinH4d9l0SefCQJYTwf:o9btFKQsTZ5BwES+GYjitNqiTbTinHw2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-04_00e3edf8d7f55608fea8a68cebd230c3_icedid
Files
-
2024-02-04_00e3edf8d7f55608fea8a68cebd230c3_icedid.exe windows:4 windows x86 arch:x86
ad90b6a413f64e5a0608c2f793086bee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
CreateFileA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
LocalAlloc
LeaveCriticalSection
GlobalReAlloc
GlobalHandle
EnterCriticalSection
TlsGetValue
TlsAlloc
FindClose
LocalReAlloc
TlsFree
lstrcatA
GetModuleHandleA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
lstrcmpA
GlobalFlags
GetCurrentThreadId
lstrcmpW
FreeLibrary
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetUnhandledExceptionFilter
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
lstrcpyA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
SetLastError
GlobalFree
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
GetWindowsDirectoryA
Sleep
CreateMutexA
CloseHandle
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
TlsSetValue
InterlockedExchange
user32
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
ModifyMenuA
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
RemovePropA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetMenu
PostMessageA
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
SetWindowLongA
SetWindowPos
IsIconic
GetWindowPlacement
CopyRect
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
GetWindow
GetWindowRect
PtInRect
GetFocus
GetWindowTextA
SetWindowTextA
GetClassNameA
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
GetDC
CharUpperA
SetCursorPos
LoadCursorA
SetCursor
GetCursorPos
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
GetSystemMetrics
GetMenuState
RegisterWindowMessageA
ClientToScreen
GetClientRect
MessageBoxA
SystemParametersInfoA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
CallWindowProcA
GetPropA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetDlgCtrlID
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
winmm
timeEndPeriod
timeGetTime
timeBeginPeriod
hge
hgeCreate
dinput
DirectInputCreateA
bass
BASS_SampleStop
BASS_ChannelStop
BASS_ChannelIsActive
BASS_SampleGetChannel
BASS_MusicLoad
BASS_ChannelSlideAttributes
BASS_ErrorGetCode
BASS_SampleGetInfo
BASS_SampleSetInfo
BASS_ChannelSetAttributes
BASS_Start
BASS_Pause
BASS_Stop
BASS_Free
BASS_SampleLoad
BASS_Init
BASS_GetDeviceDescription
BASS_GetVersion
BASS_ChannelPlay
ijl15
ord3
ord4
ord2
comctl32
ord17
shlwapi
PathStripToRootA
PathIsUNCA
PathFindFileNameA
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
SetBkColor
SetTextColor
RestoreDC
SaveDC
DeleteObject
GetClipBox
SetViewportExtEx
GetStockObject
CreateBitmap
DeleteDC
SetMapMode
PtVisible
ScaleWindowExtEx
SetWindowExtEx
GetDeviceCaps
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
ScaleViewportExtEx
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comdlg32
GetFileTitleA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 440KB - Virtual size: 436KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 135.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ