e:\Emule\Mods\GammaOH\srcghb115\Release\emule.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_a9dae996de40f6a31f6295de747801a0_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-17_a9dae996de40f6a31f6295de747801a0_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_a9dae996de40f6a31f6295de747801a0_icedid
-
Size
2.4MB
-
MD5
a9dae996de40f6a31f6295de747801a0
-
SHA1
1b69beb3ed2d9b2c50efc9f02928f8bcee54cf86
-
SHA256
6cc9b24639508a53789ea76a7737a102980c772e16482947b72cc561b66e3fb7
-
SHA512
e5a0ffd734a1da34743fabfd79646875e995d279caee15acb386116cbf1883a5ddc229c7d1459b3c828220257a8c65ca7e89f87c7381bdd2c68f53c70c904cef
-
SSDEEP
49152:WHchgaE2c4V36g9S1WYBzQiKqI38G1K6:/hjGt4SYYBzQi838G17
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-17_a9dae996de40f6a31f6295de747801a0_icedid
Files
-
2024-02-17_a9dae996de40f6a31f6295de747801a0_icedid.exe windows:4 windows x86 arch:x86
b3ed6d6a167c664b38ddd1b4e362022a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
avifil32
AVIFileRelease
AVIStreamRelease
AVIStreamInfoA
AVIFileGetStream
AVIFileOpenA
AVIStreamStart
AVIStreamReadFormat
kernel32
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
SetEnvironmentVariableA
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceA
WaitForSingleObject
CloseHandle
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetLastError
GetCurrentThreadId
GetTickCount
CreateFileA
GetFileSize
CopyFileA
lstrlenA
MultiByteToWideChar
HeapSize
TerminateProcess
SetStdHandle
CreateThread
ExitThread
RtlUnwind
GetCommandLineA
GetStartupInfoA
GetLocalTime
VirtualQuery
GetSystemInfo
VirtualAlloc
HeapReAlloc
GetFileType
PeekNamedPipe
GetFileInformationByHandle
HeapAlloc
GetSystemTimeAsFileTime
HeapFree
GetOEMCP
GetCPInfo
GlobalFlags
SetErrorMode
VirtualProtect
GetFileTime
GetFileAttributesA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
GlobalAddAtomA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
ReleaseMutex
InterlockedIncrement
InterlockedDecrement
RaiseException
FreeLibrary
GetProcAddress
LoadLibraryA
CreateMutexA
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
FreeResource
MulDiv
FindResourceExA
InterlockedExchange
GetModuleFileNameA
GetCurrentThread
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
lstrcmpA
GetFullPathNameA
GetVolumeInformationA
lstrcpyA
lstrcpynA
DuplicateHandle
UnlockFile
LockFile
FlushFileBuffers
WriteFile
ReadFile
SuspendThread
SetFilePointer
SetEndOfFile
GetTimeFormatA
GetDateFormatA
IsDBCSLeadByte
GetWindowsDirectoryA
SetCurrentDirectoryA
GetDriveTypeA
GetLogicalDriveStringsA
QueryPerformanceCounter
QueryPerformanceFrequency
SetThreadPriority
GetCurrentDirectoryA
TerminateThread
WaitForMultipleObjects
CreateEventA
GetVersion
CompareStringA
lstrcmpiA
lstrlenW
CompareStringW
GetShortPathNameA
MoveFileA
CreateDirectoryA
Beep
DeleteFileA
ResumeThread
FindClose
FindFirstFileA
GetNumberFormatA
LocalFree
FormatMessageA
GetDiskFreeSpaceA
ExitProcess
GetCurrentProcess
GetCurrentProcessId
SetUnhandledExceptionFilter
Sleep
ResetEvent
SetEvent
SetLastError
GetPrivateProfileStringA
WritePrivateProfileStringA
user32
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
CheckDlgButton
WinHelpA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
TrackPopupMenu
GetScrollPos
SetScrollInfo
GetClassInfoA
RegisterClassA
SetWindowPlacement
CallWindowProcA
IntersectRect
GetWindowPlacement
EndPaint
BeginPaint
SetMenuItemBitmaps
ModifyMenuA
GetMenuCheckMarkDimensions
CreateDialogIndirectParamA
EndDialog
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetLastActivePopup
IsWindowEnabled
RegisterClipboardFormatA
PostQuitMessage
GetMenuState
GetMenuItemID
SetWindowsHookExA
CallNextHookEx
GetMessageA
ValidateRect
GetScrollInfo
GetClassLongA
GetWindowRgn
EndDeferWindowPos
BeginDeferWindowPos
GetMenu
IsMenu
AdjustWindowRectEx
MessageBeep
GetMenuItemCount
RemoveMenu
GetDlgCtrlID
FindWindowA
SetWindowRgn
DispatchMessageA
TranslateMessage
PeekMessageA
EqualRect
GetAsyncKeyState
GetFocus
GrayStringA
DrawTextExA
TabbedTextOutA
GetSysColorBrush
ScrollDC
DrawIconEx
GetClassNameA
MapWindowPoints
CopyIcon
ShowScrollBar
LoadCursorA
UpdateWindow
GetKeyState
CheckMenuItem
EnableMenuItem
GetCaretPos
GetWindowDC
SetMenuDefaultItem
SetForegroundWindow
FlashWindow
DrawIcon
IsIconic
SetActiveWindow
CreateMenu
GetSystemMenu
CreatePopupMenu
ScreenToClient
GetCursorPos
LoadBitmapA
ReleaseCapture
SetRect
GetMessagePos
GetCapture
SetCapture
SystemParametersInfoA
DrawFrameControl
PtInRect
GetDlgItem
RedrawWindow
LoadIconA
SetParent
LoadImageA
CreateIconIndirect
GetIconInfo
CopyRect
DrawStateA
OffsetRect
GetClientRect
DrawFocusRect
InflateRect
FrameRect
TrackPopupMenuEx
GetSubMenu
PostThreadMessageA
CharNextA
IsRectEmpty
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
GetWindowRect
GetActiveWindow
WindowFromPoint
ClientToScreen
SetCursor
GetParent
GetNextDlgTabItem
DestroyIcon
DestroyMenu
DestroyCursor
InvalidateRect
IsWindowVisible
DrawTextA
DrawEdge
InsertMenuA
GetSysColor
CharUpperA
UnregisterClassA
IsWindow
FillRect
IsCharAlphaA
AppendMenuA
EnableWindow
wsprintfA
FindWindowExA
ExitWindowsEx
SetTimer
KillTimer
MessageBoxA
ReleaseDC
GetDesktopWindow
GetDC
GetClipboardData
IsClipboardFormatAvailable
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
SendMessageTimeoutA
SendMessageA
EnumWindows
GetSystemMetrics
RegisterWindowMessageA
PostMessageA
DefWindowProcA
GetWindowLongA
DestroyWindow
SetWindowLongA
CreateWindowExA
RegisterClassExA
DeferWindowPos
gdi32
SetRectRgn
OffsetRgn
FillRgn
SaveDC
RestoreDC
SetPolyFillMode
SetROP2
SetMapMode
GetClipBox
LineTo
MoveToEx
SetTextAlign
SelectClipRgn
CreatePolygonRgn
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
SelectPalette
GetRgnBox
EnumFontFamiliesExA
SetPixelV
SetBoundsRect
SetBitmapDimensionEx
GetBitmapDimensionEx
CombineRgn
Escape
RectVisible
PtVisible
CreateRectRgn
GetViewportOrgEx
GetWindowOrgEx
GetBkColor
DPtoLP
GetViewportExtEx
GetWindowExtEx
GetMapMode
LPtoDP
CreateFontA
GetTextColor
GetTextExtentExPointA
TextOutA
GdiFlush
CreateRectRgnIndirect
CreatePen
RealizePalette
Rectangle
CreatePalette
CreateSolidBrush
Polygon
SetPixel
GetPixel
DeleteDC
BitBlt
CreateBitmap
DeleteObject
SetTextColor
SetBkMode
ExtTextOutA
SetBkColor
GetTextExtentPoint32A
SelectObject
CreateFontIndirectA
GetObjectA
GetStockObject
CreateCompatibleBitmap
GetDeviceCaps
SetViewportOrgEx
CreateCompatibleDC
comdlg32
GetFileTitleA
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
ChooseFontA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
OpenProcessToken
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CryptReleaseContext
CryptAcquireContextA
CryptGenRandom
RegOpenKeyA
shell32
SHGetFileInfoA
ShellExecuteA
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
ShellExecuteExA
comctl32
ImageList_GetImageInfo
ImageList_SetBkColor
ImageList_ReplaceIcon
_TrackMouseEvent
ord17
ImageList_Draw
ImageList_GetIconSize
ImageList_AddMasked
ImageList_BeginDrag
ImageList_DragEnter
ImageList_DragMove
ImageList_DragLeave
ImageList_EndDrag
ImageList_SetOverlayImage
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_GetIcon
shlwapi
StrStrIA
PathMatchSpecA
PathRemoveBackslashA
PathCanonicalizeA
PathFileExistsA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
UrlUnescapeA
oledlg
ord8
ole32
CoRevokeClassObject
CoTaskMemAlloc
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemFree
CoInitialize
CoUninitialize
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CLSIDFromProgID
CLSIDFromString
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoGetClassObject
oleaut32
SystemTimeToVariantTime
OleCreateFontIndirect
SafeArrayDestroy
VariantCopy
VariantTimeToSystemTime
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocString
OleLoadPicture
SysAllocStringByteLen
ws2_32
select
sendto
recvfrom
WSASocketA
WSAEnumNetworkEvents
WSAEventSelect
WSAGetLastError
inet_addr
gethostbyname
htons
WSASetLastError
ntohs
socket
WSAAsyncSelect
htonl
bind
closesocket
WSACancelAsyncRequest
recv
send
WSAAsyncGetHostByName
connect
inet_ntoa
getpeername
shutdown
listen
accept
ioctlsocket
WSACleanup
WSAStartup
ntohl
gethostname
wininet
InternetOpenA
InternetOpenUrlA
InternetWriteFile
InternetSetFilePointer
InternetGetLastResponseInfoA
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetCloseHandle
InternetErrorDlg
HttpQueryInfoA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetSetStatusCallback
InternetConnectA
winmm
PlaySoundA
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 296KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 428KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ