h:\DEV\local\ViPod\ViPod\Rls_MP4\ViPod.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_59791b783fcc9d2fbb9f758c439e1f35_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_59791b783fcc9d2fbb9f758c439e1f35_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-04_59791b783fcc9d2fbb9f758c439e1f35_icedid
-
Size
1.5MB
-
MD5
59791b783fcc9d2fbb9f758c439e1f35
-
SHA1
2635a03f3ff96e49775a0d1f34e2f63c0981bbf6
-
SHA256
aee84fc0b1b427806e710f5e37bdaf603e63c2083da012ac44692f37f63bba29
-
SHA512
57d6d61fd3abd40fed7002112b96253e2c98ab31474d4ac7ee12ed28b3999d02dbacd0c630bde0edd8900ca5648e1e8b1f56d7a0eb7762433f8a6de4f6ef7840
-
SSDEEP
12288:0DF4/3evxEA48DFjbcUfMYR7B3+oivDpgz+LpCyWhHXO3WQSho5Edr7:ZuEA48xgUEYL+Gz+9CPffJdr7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-04_59791b783fcc9d2fbb9f758c439e1f35_icedid
Files
-
2024-02-04_59791b783fcc9d2fbb9f758c439e1f35_icedid.exe windows:4 windows x86 arch:x86
46e124b3440eeda6b173d68ad89f01da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetStdHandle
SetEnvironmentVariableA
lstrcatA
lstrcmpW
GetModuleHandleA
GetCurrentDirectoryA
CreateProcessA
CreateMutexA
GetProcAddress
GetStringTypeExA
CompareStringA
lstrcmpiA
GetVersion
GetCommandLineA
GetModuleFileNameA
CreateFileA
ReadFile
CloseHandle
Sleep
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
LCMapStringW
LCMapStringA
HeapSize
CreateThread
ExitThread
HeapReAlloc
GetStartupInfoA
GetDriveTypeA
VirtualQuery
GetSystemInfo
VirtualAlloc
GetSystemTimeAsFileTime
HeapAlloc
TerminateProcess
HeapFree
RtlUnwind
ExitProcess
SetErrorMode
LocalFileTimeToFileTime
GetShortPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
DeleteFileA
MoveFileA
SystemTimeToFileTime
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
VirtualProtect
WaitForMultipleObjects
ReleaseMutex
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
GlobalFree
GlobalAlloc
FormatMessageA
LocalFree
GlobalLock
GlobalUnlock
MulDiv
SetLastError
FreeResource
InterlockedExchange
GetCurrentThreadId
GlobalGetAtomNameA
FindResourceA
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GlobalAddAtomA
GlobalFindAtomA
CompareStringW
GlobalDeleteAtom
LoadResource
LockResource
SizeofResource
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
GetLastError
lstrcpyA
InterlockedDecrement
lstrlenA
WideCharToMultiByte
lstrcpynA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
user32
RemoveMenu
MoveWindow
SetWindowTextA
InsertMenuA
AppendMenuA
IsDialogMessageA
GetMenuStringA
GetMenuState
DefFrameProcA
TranslateMDISysAccel
RegisterClipboardFormatA
GetMenuCheckMarkDimensions
ModifyMenuA
SetMenuItemBitmaps
WindowFromPoint
ValidateRect
GetActiveWindow
SetRectEmpty
TranslateAcceleratorA
GetDesktopWindow
SetMenu
CreatePopupMenu
InsertMenuItemA
LoadAcceleratorsA
DestroyMenu
ReuseDDElParam
UnpackDDElParam
wsprintfA
GetNextDlgTabItem
CreateDialogIndirectParamA
SetRect
GetKeyNameTextA
MapVirtualKeyA
DeleteMenu
GetSystemMenu
SetParent
WindowFromDC
DrawFocusRect
DrawMenuBar
GetIconInfo
DrawIconEx
SetMenuItemInfoA
CopyAcceleratorTableA
CreateMenu
DrawStateA
DestroyIcon
GetDCEx
GetSysColorBrush
GetMenuItemInfoA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
ScrollWindow
TrackPopupMenuEx
TrackPopupMenu
SetScrollRange
GetScrollRange
GetScrollPos
ShowScrollBar
GetMenuItemID
GetMenuItemCount
EqualRect
SetScrollInfo
GetDlgCtrlID
CallWindowProcA
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
GetClassLongA
GetScrollInfo
GetWindowRgn
SetWindowRgn
MapWindowPoints
IsZoomed
IsMenu
AdjustWindowRectEx
EnumChildWindows
IsWindowEnabled
GetClassNameA
DrawEdge
FrameRect
SetScrollPos
BringWindowToTop
RedrawWindow
IsRectEmpty
FillRect
GetWindowLongA
GetFocus
ScreenToClient
SetWindowLongA
GetDlgItem
GetCursorPos
LockWindowUpdate
LoadMenuA
GetSubMenu
CopyRect
RegisterWindowMessageA
FindWindowA
CharUpperA
GetKeyState
GetClassInfoA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
OffsetRect
KillTimer
SetTimer
IsWindowVisible
IsIconic
LoadBitmapA
CopyIcon
MessageBeep
IsWindow
DestroyCursor
ReleaseCapture
EnableWindow
GetParent
SetCapture
ReleaseDC
GetDC
GetWindowRect
SendMessageA
InflateRect
PtInRect
GetSysColor
SetCursor
LoadCursorA
LoadIconA
DrawIcon
ShowOwnedPopups
RegisterClassA
CreateWindowExA
GetMenu
PostMessageA
GetMessageA
DispatchMessageA
TranslateMessage
PostQuitMessage
DefWindowProcA
ShowWindow
InvalidateRect
GetSystemMetrics
UnregisterClassA
EndDialog
EnableMenuItem
CheckMenuItem
UpdateWindow
SetForegroundWindow
SetFocus
MessageBoxA
GetClientRect
SetWindowPos
advapi32
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegSetValueA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegDeleteValueA
SetFileSecurityA
GetFileSecurityA
RegCreateKeyA
ole32
GetRunningObjectTable
CoTaskMemAlloc
OleLockRunning
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
CoUninitialize
CoInitializeEx
shell32
ShellExecuteA
DragFinish
DragQueryFileA
ExtractIconA
SHGetFileInfoA
DragAcceptFiles
oleaut32
VariantClear
VariantInit
VariantChangeType
SysAllocStringLen
shlwapi
PathFileExistsA
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathRemoveExtensionA
PathRemoveFileSpecA
gdi32
GetStockObject
CreateFontIndirectA
GetObjectA
GetTextExtentPoint32A
CreatePenIndirect
CreateBrushIndirect
CreateRectRgn
CreateCompatibleDC
GetDeviceCaps
SelectObject
StretchBlt
DeleteObject
CreateSolidBrush
CreateCompatibleBitmap
GetBkColor
GetMapMode
GetViewportExtEx
GetWindowExtEx
DPtoLP
LPtoDP
Polygon
Rectangle
BitBlt
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreatePen
GetTextExtentPointA
RestoreDC
SetBkMode
SetTextColor
SetBkColor
CreateDIBSection
SetTextAlign
SaveDC
GetCurrentObject
CreateBitmap
CreatePolygonRgn
GetPixel
CreateRectRgnIndirect
SetRectRgn
CombineRgn
OffsetRgn
FillRgn
GetClipBox
SetStretchBltMode
SetMapMode
ExcludeClipRect
IntersectClipRect
LineTo
MoveToEx
SelectClipRgn
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreatePatternBrush
StretchDIBits
GetCharWidthA
CreateFontA
GetTextMetricsA
PatBlt
CreateEllipticRgn
Ellipse
GetNearestColor
SetPixel
SetGraphicsMode
GetGraphicsMode
RoundRect
comdlg32
GetFileTitleA
GetSaveFileNameA
CommDlgExtendedError
GetOpenFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comctl32
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_GetImageCount
ImageList_DrawIndirect
ImageList_LoadImageA
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
ord17
ImageList_GetIcon
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_GetImageInfo
ImageList_Draw
Sections
.text Size: 572KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 820KB - Virtual size: 816KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ