c:\Documents and Settings\ktouda\デスクトップ\TechSupportDB\インストーラ\Start\Release\Start.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_c08ac20a121f979691e219933dfb91d3_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-20_c08ac20a121f979691e219933dfb91d3_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-20_c08ac20a121f979691e219933dfb91d3_icedid
-
Size
248KB
-
MD5
c08ac20a121f979691e219933dfb91d3
-
SHA1
9215c107af992714821a288dec8df2ed770ec111
-
SHA256
fa768f996f287e2a95173d8b3ee2d46a2b3667d2ac249beee714666fe01aa66a
-
SHA512
15b5d8aeaf4d431134a286d8a7334e2d6a84dd75d57cbfaad3fd454c6757427d534b603dce0728c4f641f901d12fd9b027bf19e2e82b5c774d0ad8c678924d6f
-
SSDEEP
6144:OQiV710HnlDsyOj67aZCUYvs+EG1G134EP:OQ2x0HlYyOSeYvfG2EP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-20_c08ac20a121f979691e219933dfb91d3_icedid
Files
-
2024-02-20_c08ac20a121f979691e219933dfb91d3_icedid.exe windows:4 windows x86 arch:x86
af45cda6283801204bc71b59c47b3aa2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetLocalTime
TerminateProcess
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetTickCount
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
GetOEMCP
GetCPInfo
FileTimeToSystemTime
SetErrorMode
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GlobalFlags
InterlockedDecrement
InterlockedIncrement
WritePrivateProfileStringA
SetLastError
MulDiv
GlobalUnlock
FreeResource
GlobalFree
GlobalAddAtomA
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentThread
GetCurrentThreadId
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
FormatMessageA
LocalFree
GetTempPathA
HeapAlloc
HeapFree
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
LoadLibraryA
GetCurrentProcess
FreeLibrary
GetModuleHandleA
GetProcAddress
CompareStringW
CompareStringA
GetVersion
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetCommandLineA
lstrcpyA
lstrcmpiA
lstrcpynA
SetCurrentDirectoryA
GetCurrentDirectoryA
lstrlenA
lstrcatA
CreateMutexA
GetLastError
GetStdHandle
CloseHandle
user32
PostThreadMessageA
MessageBeep
GetNextDlgTabItem
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
IsWindow
IsChild
GetForegroundWindow
SetActiveWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetClientRect
GetMenu
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
IsIconic
GetWindowPlacement
CopyRect
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetSysColorBrush
UnregisterClassA
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
LoadStringA
MessageBoxA
CharUpperA
GetSystemMetrics
PostMessageA
PostQuitMessage
SetCursor
SendMessageA
EnableWindow
UnhookWindowsHookEx
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowTextA
SetWindowTextA
GetClassNameA
wsprintfA
GetDesktopWindow
ReleaseCapture
LoadCursorA
GetCapture
RegisterClipboardFormatA
CreateDialogIndirectParamA
EndDialog
SetCapture
ClientToScreen
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindow
DestroyMenu
SystemParametersInfoA
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
CallNextHookEx
SetWindowsHookExA
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
GetFocus
SetMenuItemBitmaps
GetDlgItem
SetWindowPos
MapDialogRect
SetWindowContextHelpId
gdi32
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SelectObject
GetMapMode
CreateBitmap
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectA
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
SetViewportOrgEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
oleaut32
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
OleCreateFontIndirect
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
Sections
.text Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ