e:\StreamAuthor4.0\Generic\trunk\Selfextraction\Release\SelfExtraction.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_015cd04112f5a4b9bc249623ed38c870_icedid.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-20_015cd04112f5a4b9bc249623ed38c870_icedid.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-20_015cd04112f5a4b9bc249623ed38c870_icedid
-
Size
14.3MB
-
MD5
015cd04112f5a4b9bc249623ed38c870
-
SHA1
92ef1e1f5e946f70ce788d7465bb73175e5d8167
-
SHA256
6201a24512ca7596ef207a6716f3777f4af724c9e0a2498bb2de555483f3b3d8
-
SHA512
7b93bdd23d8650dff739a79691321a7d26f3a44b5d0fec6c06c272331cb8a3a817a6abbf7a8646308be0d8226a0aafb503b961143a09ef06050f4a921ca3b694
-
SSDEEP
196608:wPVRCLMgpFGaQmS+4RN6iEq6l+8QtXX5HeQRF7qSdRnflSrWgGJ+R7WfdJ:0aQmSNNPEs8QtZ+km+foryJQ7WfdJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-20_015cd04112f5a4b9bc249623ed38c870_icedid
Files
-
2024-02-20_015cd04112f5a4b9bc249623ed38c870_icedid.exe windows:4 windows x86 arch:x86
2e17e7cb2ae6c2437fc5e8e84eb0251e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathIsUNCA
PathFindExtensionA
PathRemoveExtensionA
PathFindFileNameA
PathStripToRootA
PathFileExistsA
kernel32
LocalUnlock
LocalLock
GetTempFileNameA
GetDiskFreeSpaceA
RtlUnwind
HeapFree
GetDriveTypeA
HeapAlloc
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapReAlloc
ExitThread
CreateThread
HeapSize
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
HeapDestroy
SetErrorMode
VirtualFree
FatalAppExitA
SetCurrentDirectoryA
GetTimeZoneInformation
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetConsoleCtrlHandler
SetEnvironmentVariableA
GetLocaleInfoW
GetOEMCP
GetCPInfo
GlobalFlags
GetCurrentDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetFileTime
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
GetShortPathNameA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
FileTimeToSystemTime
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
FreeResource
InterlockedDecrement
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
lstrcmpA
SetLastError
CopyFileA
MulDiv
GlobalSize
lstrcpynA
GetStringTypeExW
GetStringTypeExA
GetEnvironmentVariableW
GetEnvironmentVariableA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiW
lstrlenW
lstrcmpiA
GetVersion
MultiByteToWideChar
GetModuleFileNameA
CreateProcessA
GetTickCount
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
Sleep
TerminateProcess
GetLastError
FormatMessageA
LocalFree
GlobalAlloc
GlobalLock
IsBadWritePtr
GlobalUnlock
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetFileAttributesA
CreateDirectoryA
GetTempPathA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetSystemTime
SystemTimeToFileTime
HeapCreate
user32
UnionRect
PostThreadMessageA
SetTimer
KillTimer
IsClipboardFormatAvailable
GetTabbedTextExtentA
GetDCEx
LockWindowUpdate
SetParent
MapVirtualKeyA
GetKeyNameTextA
RegisterClipboardFormatA
LoadMenuA
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
GetDialogBaseUnits
DestroyIcon
DeleteMenu
WaitMessage
GetWindowThreadProcessId
ReleaseCapture
WindowFromPoint
SetCapture
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
DestroyMenu
GetMenuItemInfoA
InflateRect
ScrollWindowEx
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
GetDlgItemInt
CheckRadioButton
CheckDlgButton
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenuEx
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
UnregisterClassA
MessageBoxA
PeekMessageA
wsprintfA
DrawIcon
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
GetClientRect
EnableWindow
LoadIconA
GetSystemMetrics
RegisterWindowMessageA
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
UnhookWindowsHookEx
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CharLowerA
CharLowerW
CharUpperA
CharUpperW
RemoveMenu
GetSubMenu
GetMenuItemCount
InsertMenuA
GetMenuItemID
GetMenuStringA
GetMenuState
PostMessageA
PostQuitMessage
SetCursor
ShowOwnedPopups
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
ValidateRect
GetCursorPos
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
CallNextHookEx
SetWindowsHookExA
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
gdi32
GetMapMode
PatBlt
DPtoLP
CreateCompatibleBitmap
StretchDIBits
GetCharWidthA
CreateFontA
StartPage
EndPage
CombineRgn
AbortDoc
EndDoc
SetRectRgn
GetRgnBox
CreateRectRgnIndirect
GetTextColor
GetBkColor
GetTextMetricsA
CreateHatchBrush
CreateSolidBrush
ExtCreatePen
CreatePen
PlayMetaFile
EnumMetaFile
GetObjectType
PlayMetaFileRecord
SelectPalette
GetStockObject
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
CreatePatternBrush
CreateDIBPatternBrushPt
DeleteDC
ExtSelectClipRgn
PolyBezierTo
PolylineTo
ScaleWindowExtEx
PolyDraw
ArcTo
CopyMetaFileA
SetAbortProc
GetDeviceCaps
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
StartDocA
GetPixel
GetWindowExtEx
GetViewportExtEx
SelectClipPath
CreateRectRgn
GetClipRgn
SelectClipRgn
DeleteObject
SetColorAdjustment
SetArcDirection
SetMapperFlags
SetTextCharacterExtra
SetTextJustification
SetTextAlign
MoveToEx
LineTo
OffsetClipRgn
IntersectClipRect
ExcludeClipRect
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
RestoreDC
SaveDC
GetTextExtentPoint32A
ExtTextOutA
BitBlt
CreateCompatibleDC
CreateFontIndirectA
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDCOrgEx
CreateBitmap
CreateDCA
GetCurrentPositionEx
comdlg32
PageSetupDlgA
FindTextA
ReplaceTextA
CommDlgExtendedError
PrintDlgA
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetJobA
advapi32
SetFileSecurityA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueA
RegOpenKeyA
RegEnumKeyA
GetFileSecurityA
RegDeleteKeyA
RegCreateKeyA
RegQueryValueA
shell32
DragQueryFileA
DragFinish
ExtractIconA
SHGetFileInfoA
SHGetFolderPathA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ord13
ImageList_Read
ImageList_Write
ord14
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_Merge
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
CoGetClassObject
StringFromGUID2
CoCreateInstance
CoDisconnectObject
CLSIDFromString
CLSIDFromProgID
OleDuplicateData
ReleaseStgMedium
StgCreateDocfileOnILockBytes
CreateBindCtx
CoTreatAsClass
StringFromCLSID
ReadClassStg
ReadFmtUserTypeStg
OleRegGetUserType
WriteClassStg
WriteFmtUserTypeStg
SetConvertStg
CoTaskMemFree
CreateILockBytesOnHGlobal
OleRun
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterClassObject
CoRevokeClassObject
OleSetClipboard
OleIsCurrentClipboard
CreateStreamOnHGlobal
CoRegisterMessageFilter
CoTaskMemAlloc
OleFlushClipboard
oleaut32
SafeArrayGetElement
LoadTypeLi
OleCreateFontIndirect
VarBstrFromDate
VarBstrFromCy
VarCyFromStr
VarDecFromStr
SysFreeString
SysStringLen
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
SafeArrayRedim
VariantCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayCopy
VarBstrFromDec
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayDestroyData
SafeArrayDestroyDescriptor
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
SysReAllocStringLen
VarDateFromStr
Sections
.text Size: 392KB - Virtual size: 389KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ