e:\Build\Jupiter\Branch_license_agent_2_1_0\Jupiter\Jupiter\bin\Release\Verifier.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_cb537c3f2c96a610ea7689ffd431affb_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-18_cb537c3f2c96a610ea7689ffd431affb_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_cb537c3f2c96a610ea7689ffd431affb_icedid
-
Size
2.6MB
-
MD5
cb537c3f2c96a610ea7689ffd431affb
-
SHA1
97c0be889b36734ee0796edbd0fe41a534d8b198
-
SHA256
2ad90a263fa99ec655af7ed8da0a18cdaf24c441f591bcbbad3c8c8384ea3c03
-
SHA512
a9692c9637d3d814f619416cb5671868233f2fd087412fdc8253e7236cfbd7f5fd135474066589513cdb1da78bd62aa82cae70d2b4df1bc4a86b976bcc48d98f
-
SSDEEP
49152:fk+VEk55265QlsBffcKepnfeiHpV6pRAa6yyyyyyyyyyyyyyyyyyyyyyyyyyyyy0:8+VrQ2fTedDt3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-18_cb537c3f2c96a610ea7689ffd431affb_icedid
Files
-
2024-02-18_cb537c3f2c96a610ea7689ffd431affb_icedid.exe windows:4 windows x86 arch:x86
fe86a846a0dc2b30eb5724f2c79ec436
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
timeGetTime
kernel32
FileTimeToLocalFileTime
GetFileTime
GlobalFlags
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
FindResourceExA
WritePrivateProfileStringA
SetErrorMode
RtlUnwind
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapReAlloc
ExitThread
CreateThread
HeapSize
QueryPerformanceCounter
FileTimeToSystemTime
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetStdHandle
SetConsoleCtrlHandler
IsBadReadPtr
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetEnvironmentVariableA
GetLocaleInfoW
ReleaseMutex
CreateMutexA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
MoveFileA
CreateEventA
SuspendThread
SetThreadPriority
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
VirtualProtect
MulDiv
GlobalAlloc
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpynA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetSystemTime
GlobalMemoryStatus
FlushConsoleInputBuffer
IsValidCodePage
IsDBCSLeadByteEx
GetFullPathNameA
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryW
GetCurrentDirectoryA
DuplicateHandle
CreateFileW
SetFilePointer
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
WaitForMultipleObjects
PeekNamedPipe
GetTickCount
GetExitCodeThread
SetLastError
SleepEx
QueryDosDeviceA
DefineDosDeviceA
GetVolumeInformationA
GetDiskFreeSpaceA
DeviceIoControl
FormatMessageA
LocalAlloc
GetSystemDirectoryA
GetProcessHeap
HeapAlloc
ExitProcess
HeapFree
FindFirstFileA
FindClose
DeleteFileA
CreateDirectoryA
CreateFileA
Sleep
GetFileInformationByHandle
GetFileAttributesA
SetFileAttributesA
LocalFree
WriteFile
GetDriveTypeA
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
EnterCriticalSection
ReadFile
LeaveCriticalSection
GetFileSize
RemoveDirectoryA
SetEvent
LoadLibraryA
GetProcAddress
GetStartupInfoA
GetCurrentProcess
CreateProcessA
ReadProcessMemory
WriteProcessMemory
ResumeThread
TerminateProcess
OpenProcess
WaitForSingleObject
CloseHandle
FreeLibrary
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
MultiByteToWideChar
GetModuleHandleA
WideCharToMultiByte
GetWindowsDirectoryA
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetCurrentProcessId
user32
DestroyMenu
LoadCursorA
GetSysColorBrush
MsgWaitForMultipleObjects
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
MapDialogRect
GetAsyncKeyState
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
wsprintfA
WaitForInputIdle
EnumWindows
GetWindowThreadProcessId
LoadBitmapA
UnregisterClassA
CharUpperA
SendMessageA
PostMessageA
GetParent
MessageBoxA
EnableWindow
GetClassInfoExA
TabbedTextOutA
gdi32
CreateCompatibleBitmap
Escape
ExtTextOutA
TextOutA
RectVisible
GetBitmapBits
EnumFontFamiliesExA
GetStockObject
CreateCompatibleDC
SelectObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetTextColor
SetBkColor
PtVisible
BitBlt
SetMapMode
RestoreDC
SaveDC
CreateDCA
GetDeviceCaps
CreateBitmap
GetObjectA
CreateFontA
DeleteObject
GetClipBox
SetViewportOrgEx
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
AllocateAndInitializeSid
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegEnumKeyExA
RegOpenKeyA
RegDeleteKeyA
FreeSid
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
shell32
ShellExecuteA
comctl32
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
GetErrorInfo
SysFreeString
VariantInit
VariantCopy
VariantClear
SysAllocStringByteLen
SysStringByteLen
SafeArrayGetVartype
SafeArrayCopy
SysAllocStringLen
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
VariantChangeType
ws2_32
getsockopt
listen
gethostbyaddr
accept
inet_ntoa
WSASetLastError
gethostbyname
WSAGetLastError
socket
connect
setsockopt
shutdown
WSACleanup
WSAStartup
send
recv
select
ntohs
htons
closesocket
__WSAFDIsSet
ioctlsocket
getsockname
bind
inet_addr
imagehlp
MapAndLoad
UnMapAndLoad
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 696KB - Virtual size: 695KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 300KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE