e:\Project\Project110527( 8500 )\Mini-App\GVAviToExe\Release\GvAviToExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_472585435edd3db84de5fce139cc6df3_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_472585435edd3db84de5fce139cc6df3_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-13_472585435edd3db84de5fce139cc6df3_icedid
-
Size
25.0MB
-
MD5
472585435edd3db84de5fce139cc6df3
-
SHA1
2cad80bd2ad5acdf62721a9c6f435f038c390437
-
SHA256
4efc4aaf5a44992ffab447723aba0831b0165033b479f191588301e0bdd7d855
-
SHA512
5c2c1458c289d155e76b468f3a86649aad9342afb450c74b25b8e3e06ee7fb485dd7b5d8dcf257d5357f41e172ff7281b97706a4315750de427aa23d49c76787
-
SSDEEP
786432:gJr4dqjmuo5iYDwpSEL5cz7Os/StBtsKxocG:a4d0muoHcoMs/SX2Ky
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-13_472585435edd3db84de5fce139cc6df3_icedid
Files
-
2024-02-13_472585435edd3db84de5fce139cc6df3_icedid.exe windows:5 windows x86 arch:x86
cead7bddce64ffc705c5e7547cb8a778
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
GetModuleHandleW
SetErrorMode
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
ExitProcess
VirtualProtect
VirtualAlloc
VirtualQuery
HeapReAlloc
HeapSize
GetACP
EnterCriticalSection
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetFileTime
GetFileSizeEx
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
GetModuleFileNameW
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
FormatMessageA
LocalFree
MulDiv
GlobalGetAtomNameA
GlobalFindAtomA
MultiByteToWideChar
lstrcmpW
lstrlenA
GlobalUnlock
GlobalFree
FreeResource
GetCurrentProcessId
SetLastError
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetFileAttributesExA
SetFileAttributesA
CreateWaitableTimerA
OpenWaitableTimerA
GetPrivateProfileIntA
SetWaitableTimer
CancelWaitableTimer
CreateThread
GetWindowsDirectoryA
GetCurrentThreadId
GetTickCount
WritePrivateProfileStringA
CreateMutexA
OpenMutexA
ReleaseMutex
GetCurrentProcess
OutputDebugStringA
GetVersionExA
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetVersion
CreateEventA
OpenEventA
GetDateFormatA
GetTimeFormatA
GetLocalTime
WaitForMultipleObjects
GetFileAttributesA
GetLastError
CreateProcessA
WaitForSingleObject
CloseHandle
Sleep
GetCurrentDirectoryA
SetCurrentDirectoryA
GetModuleFileNameA
ResetEvent
SetEvent
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
IsValidCodePage
FindResourceA
user32
PostThreadMessageA
GetNextDlgGroupItem
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
ReleaseCapture
LoadCursorA
SetCapture
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CharUpperA
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
DefWindowProcA
CallWindowProcA
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextLengthA
GetWindowTextA
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetWindow
SetWindowContextHelpId
MapDialogRect
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
RegisterClipboardFormatA
GetWindowLongA
IsWindowEnabled
UnregisterClassA
DestroyMenu
MessageBeep
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostQuitMessage
InvalidateRect
UpdateWindow
FillRect
GetSysColor
LoadIconA
EnableWindow
GetClientRect
SendMessageA
DrawIcon
MessageBoxA
PostMessageA
GetSystemMetrics
SetForegroundWindow
GetLastActivePopup
FindWindowA
BringWindowToTop
IsIconic
SetWindowPos
gdi32
ExtTextOutA
CreateSolidBrush
CreateRectRgnIndirect
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
GetStockObject
DeleteDC
TextOutA
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
CreateBitmap
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
Escape
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegEnumKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
InitializeSecurityDescriptor
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SetSecurityDescriptorDacl
shell32
SHGetSpecialFolderPathA
ShellExecuteA
ShellExecuteExA
SHCreateDirectoryExA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecA
oledlg
ord8
ole32
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoFreeUnusedLibraries
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoUninitialize
CoInitializeEx
OleIsCurrentClipboard
OleFlushClipboard
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
oleaut32
VariantCopy
SysAllocString
SafeArrayDestroy
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
VariantInit
VariantChangeType
VariantClear
VariantTimeToSystemTime
SystemTimeToVariantTime
SysFreeString
SysAllocStringLen
avifil32
AVIFileInit
AVIFileExit
winmm
timeBeginPeriod
timeSetEvent
timeEndPeriod
timeKillEvent
timeGetDevCaps
Sections
.text Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ