d:\Project8210\ViewlogStartup\Ver_Hungarian\Release\ViewlogStartup_Hun.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_a8036cacd5d315fb43a84bc999aa4010_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_a8036cacd5d315fb43a84bc999aa4010_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-12_a8036cacd5d315fb43a84bc999aa4010_icedid
-
Size
168KB
-
MD5
a8036cacd5d315fb43a84bc999aa4010
-
SHA1
9fc10a3ca3a8f88d7af37ebf202e80e9e8c61c98
-
SHA256
d095c222bbc80f1883fcf57368f05be23d413cc811280cd513336171f0d38753
-
SHA512
94d6fd4a262066a870d44ef3bfbfc3d049e4e9c4857b5afe07fbf6ed2706b52a6dfd22cbfdb7e83f7a2ad500a2f2ea0d5a82b5296a7f034121034e6836864e6a
-
SSDEEP
3072:j6/1DjoooNwtF2NYTGt7T2kQZa+nlSpc5+Eo3hlPwnYD:OAooNwtEmTACkQcEqcx0bwn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-12_a8036cacd5d315fb43a84bc999aa4010_icedid
Files
-
2024-02-12_a8036cacd5d315fb43a84bc999aa4010_icedid.exe windows:4 windows x86 arch:x86
e6b55f60da5ce35b34cde01d5d17ab95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
GetStartupInfoA
GetCommandLineA
TerminateProcess
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetErrorMode
GetOEMCP
GetCPInfo
GetShortPathNameA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
GlobalAddAtomA
CreateMutexA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
lstrcpynA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
InterlockedDecrement
InterlockedIncrement
CreateEventA
CloseHandle
WaitForSingleObject
ReleaseMutex
SetCurrentDirectoryA
GetFileAttributesA
GetModuleFileNameA
GetWindowsDirectoryA
GetPrivateProfileIntA
WritePrivateProfileStringA
FindResourceA
LoadResource
LockResource
SizeofResource
SetEvent
lstrlenA
InterlockedExchange
lstrlenW
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetCurrentProcessId
user32
ShowWindow
SetWindowTextA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
GetSysColor
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowRect
CopyRect
PtInRect
GetWindow
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindowLongA
IsWindowEnabled
SetCursor
PostQuitMessage
PostMessageA
GetMenuItemID
DestroyMenu
GetMenuItemCount
GetSubMenu
UnregisterClassA
UnhookWindowsHookEx
SetMenuItemBitmaps
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetSystemMetrics
LoadIconA
EnableWindow
GetClientRect
SendMessageA
MessageBoxA
SetForegroundWindow
GetLastActivePopup
FindWindowA
IsIconic
GetWindowPlacement
wsprintfA
DestroyIcon
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CallWindowProcA
RegisterWindowMessageA
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
DeleteObject
GetDeviceCaps
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyA
RegSetValueA
shell32
ExtractIconA
ShellExecuteA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
PathRemoveFileSpecA
ole32
CoInitializeEx
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemFree
StringFromCLSID
CoTaskMemAlloc
CoDisconnectObject
CoUninitialize
oleaut32
SysAllocString
VariantChangeType
VariantCopy
VariantClear
SysFreeString
SysStringByteLen
VariantInit
SysStringLen
SysAllocStringByteLen
LoadTypeLi
SysAllocStringLen
Sections
.text Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ