h:\Develope\ExeDRM\MyFolder.NET\MetaInstaller_link\MyFolder_Release\MetaInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_ce92cc67f52108d2517660d478f84ad5_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-17_ce92cc67f52108d2517660d478f84ad5_icedid.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-17_ce92cc67f52108d2517660d478f84ad5_icedid
-
Size
240KB
-
MD5
ce92cc67f52108d2517660d478f84ad5
-
SHA1
4f7f0d7a1be66a44bf1f0d2150cd7dbb78513ed9
-
SHA256
9345b3988485d73686ce88fbf1e52eab0cbcfad002fb50d0f7ba3a05f08c9205
-
SHA512
ea5e333d32586a1ee31155d77b90bf02c67801fa7793afbdf544531ca4961951af9edf71e95bef04b16f1418e32eb4137aaff9622183a377ee305c948a37f5b7
-
SSDEEP
3072:7YetIZKCceYoX8htHWOH5+8woJ0faKk711heO6qUZq+WeDkZOwUzO6lxhRnVLmF8:7kOxWKZ5J7lBeq+2ZOhrRnFm2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-17_ce92cc67f52108d2517660d478f84ad5_icedid
Files
-
2024-02-17_ce92cc67f52108d2517660d478f84ad5_icedid.exe windows:4 windows x86 arch:x86
7365d729324807c1ec19b22b10988c27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemTimeAsFileTime
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetStartupInfoA
GetCommandLineA
TerminateProcess
ExitThread
CreateThread
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
SetErrorMode
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
FlushFileBuffers
InterlockedDecrement
WritePrivateProfileStringA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcatA
lstrcmpW
SetLastError
GlobalFree
WriteFile
SetFileTime
CreateDirectoryA
DosDateTimeToFileTime
SystemTimeToFileTime
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetFileType
SetFilePointer
lstrcpynA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
MultiByteToWideChar
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FreeResource
ExitProcess
GetCurrentDirectoryA
GetModuleFileNameA
SetFileAttributesA
FormatMessageA
LocalFree
CreateProcessA
WaitForSingleObject
CloseHandle
DeleteFileA
GetTempPathA
GetTempFileNameA
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
GetProcAddress
FreeLibrary
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetStdHandle
InterlockedExchange
user32
LoadCursorA
GetSysColorBrush
DestroyMenu
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
SetCursor
PostQuitMessage
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextA
GetLastActivePopup
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
IsWindowVisible
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
GetWindowPlacement
CopyRect
PtInRect
GetWindow
GetMenuState
GetMenuItemCount
RegisterWindowMessageA
DrawAnimatedRects
FindWindowA
EnumChildWindows
GetClassNameA
GetCursorPos
TrackPopupMenu
SetMenuDefaultItem
IsWindow
SetForegroundWindow
SetParent
SetActiveWindow
KillTimer
GetForegroundWindow
GetWindowRect
PostMessageA
LoadMenuA
GetSubMenu
GetMenuItemID
SystemParametersInfoA
UnregisterClassA
MessageBoxExA
LoadBitmapA
GetSystemMetrics
LoadIconA
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
FillRect
GetClientRect
SendMessageA
EnableWindow
GetParent
wsprintfA
gdi32
PtVisible
DeleteObject
GetStockObject
RectVisible
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
CreateSolidBrush
SetMapMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
GetObjectA
TextOutA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegCloseKey
shell32
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
SHAppBarMessage
SHGetFolderPathA
comctl32
_TrackMouseEvent
ord17
shlwapi
PathAppendA
PathFileExistsA
PathFindExtensionA
PathFindFileNameA
StrFormatByteSizeA
ole32
CreateStreamOnHGlobal
oleaut32
VariantInit
VariantChangeType
VariantClear
OleLoadPicture
SystemTimeToVariantTime
urlmon
URLDownloadToFileA
ws2_32
WSAStartup
WSACleanup
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ