e:\Build\Jupiter\Release_license_agent_2_0_0_0\Jupiter\Jupiter\bin\Release\Verifier.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_e6761e939c7d635d3275aef8642f818b_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_e6761e939c7d635d3275aef8642f818b_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_e6761e939c7d635d3275aef8642f818b_icedid
-
Size
2.5MB
-
MD5
e6761e939c7d635d3275aef8642f818b
-
SHA1
ac8d36868c6cea89860ae38b79a5bef5aed1b508
-
SHA256
d22224c189bb2b421eb944169453b3c80841385c358ea459619ba784adf815dc
-
SHA512
34d99103b9ffdbea074d840c4fe3e70aac131ad5cc1f9f3ff97911c8e69eea41c442d5e43f60b2956cbbb58e4e437105c41a9333857e73676af67aaa8cabef61
-
SSDEEP
49152:x/Ogw46gkAfwPRPfWbzrNSJimpL7CiSgAa6yyyyyyyyyyyyyyyyyyyyyyyyyyyyk:xG90oPlfezr5bFto
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-18_e6761e939c7d635d3275aef8642f818b_icedid
Files
-
2024-02-18_e6761e939c7d635d3275aef8642f818b_icedid.exe windows:4 windows x86 arch:x86
72df7410b0551e56baf95204774e5bfb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
timeGetTime
kernel32
GetFileTime
GlobalFlags
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
FindResourceExA
WritePrivateProfileStringA
SetErrorMode
RtlUnwind
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapReAlloc
ExitThread
CreateThread
HeapSize
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetStdHandle
SetConsoleCtrlHandler
IsBadReadPtr
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetEnvironmentVariableA
GetLocaleInfoW
FileTimeToLocalFileTime
FileTimeToSystemTime
ReleaseMutex
CreateMutexA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
MoveFileA
CreateEventA
SuspendThread
SetThreadPriority
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
VirtualProtect
MulDiv
GlobalAlloc
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpynA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetSystemTime
IsValidCodePage
IsDBCSLeadByteEx
GetFullPathNameA
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryW
GetCurrentDirectoryA
DuplicateHandle
CreateFileW
SetFilePointer
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
WaitForMultipleObjects
PeekNamedPipe
GetTickCount
GetExitCodeThread
SetLastError
SleepEx
QueryDosDeviceA
DefineDosDeviceA
GetVolumeInformationA
GetDiskFreeSpaceA
DeviceIoControl
GetSystemDirectoryA
GetProcessHeap
HeapAlloc
ExitProcess
HeapFree
FindFirstFileA
FindClose
DeleteFileA
CreateDirectoryA
GlobalMemoryStatus
FlushConsoleInputBuffer
GetFileInformationByHandle
CreateFileA
GetDriveTypeA
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
Sleep
GetFileAttributesA
SetFileAttributesA
WriteFile
EnterCriticalSection
ReadFile
LeaveCriticalSection
GetFileSize
RemoveDirectoryA
SetEvent
LoadLibraryA
GetProcAddress
GetStartupInfoA
GetCurrentProcess
CreateProcessA
ReadProcessMemory
WriteProcessMemory
ResumeThread
TerminateProcess
OpenProcess
WaitForSingleObject
CloseHandle
FreeLibrary
FormatMessageA
LocalFree
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
MultiByteToWideChar
GetModuleHandleA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetCurrentProcessId
user32
DestroyMenu
LoadCursorA
GetSysColorBrush
MsgWaitForMultipleObjects
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
GetAsyncKeyState
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
WaitForInputIdle
EnumWindows
GetWindowThreadProcessId
LoadBitmapA
UnregisterClassA
CharUpperA
SendMessageA
PostMessageA
GetParent
MessageBoxA
EnableWindow
GetClassNameA
MapDialogRect
gdi32
EnumFontFamiliesExA
CreateCompatibleBitmap
GetBitmapBits
GetStockObject
CreateCompatibleDC
PtVisible
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
DeleteObject
CreateFontA
BitBlt
SetMapMode
RestoreDC
SaveDC
CreateDCA
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
RectVisible
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
AllocateAndInitializeSid
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegEnumKeyExA
RegOpenKeyA
RegDeleteKeyA
FreeSid
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
shell32
ShellExecuteA
comctl32
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oleaut32
VariantClear
VariantChangeType
VariantInit
ws2_32
listen
gethostbyaddr
accept
inet_ntoa
WSASetLastError
gethostbyname
WSAGetLastError
socket
connect
setsockopt
getsockopt
inet_addr
bind
WSACleanup
WSAStartup
send
recv
select
ntohs
htons
closesocket
__WSAFDIsSet
ioctlsocket
getsockname
shutdown
imagehlp
MapAndLoad
UnMapAndLoad
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 696KB - Virtual size: 694KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE