d:\MixMaster_Client_Working\MixMaster_Patcher\Release_BR\AutoPatch_BR.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_e64d9b23b5d1bce53fe80c7daf72480f_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-22_e64d9b23b5d1bce53fe80c7daf72480f_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_e64d9b23b5d1bce53fe80c7daf72480f_icedid
-
Size
368KB
-
MD5
e64d9b23b5d1bce53fe80c7daf72480f
-
SHA1
6a15da35061962aba502f6ccd87f7ed84eba24f3
-
SHA256
a47cd5ce17ab7186c7a8e04e78865c88aa30e0140892d8040e79308d589b4800
-
SHA512
ee727acb691b14c1e3010d0b4280afe004ea991d0b9eacc1a4fdfdaf8c78b283514f8487b40ef1423080be6141bb665462d5602a7f980399c6b5e82cf960660d
-
SSDEEP
6144:zM2402xBAGZDKHxBNsu2w/1HYVqhtvq0k//JjSRKEKvPIeY:zh4LxBAGVKHLN8w/1H+dNiuO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-22_e64d9b23b5d1bce53fe80c7daf72480f_icedid
Files
-
2024-02-22_e64d9b23b5d1bce53fe80c7daf72480f_icedid.exe windows:4 windows x86 arch:x86
cedafa94641947b6d6eb50e56f562726
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
TerminateProcess
ExitThread
CreateThread
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
VirtualAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
VirtualProtect
HeapFree
HeapAlloc
RtlUnwind
SetErrorMode
GetFileTime
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalReAlloc
RaiseException
GlobalFlags
InterlockedIncrement
WritePrivateProfileStringA
CreateFileA
GetFullPathNameA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
FreeResource
SetLastError
MulDiv
FormatMessageA
lstrcpynA
LocalFree
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
CloseHandle
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
FindFirstFileA
FindClose
SetFileAttributesA
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
_lopen
_lread
GlobalAlloc
GlobalLock
_lclose
GlobalHandle
GlobalUnlock
GlobalFree
GetVolumeInformationA
GetTickCount
GetFileAttributesA
CreateDirectoryA
ExitProcess
DeleteFileA
WideCharToMultiByte
DeleteCriticalSection
InitializeCriticalSection
FindResourceA
LoadResource
LockResource
SizeofResource
TerminateThread
GetCurrentDirectoryA
WaitForSingleObject
OutputDebugStringA
LeaveCriticalSection
EnterCriticalSection
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
UnhandledExceptionFilter
InterlockedExchange
user32
LoadMenuA
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
InvalidateRgn
CopyAcceleratorTableA
DestroyMenu
GetMenuItemInfoA
GetSysColorBrush
ReleaseCapture
LoadCursorA
SetCapture
SetWindowRgn
IsRectEmpty
InflateRect
wsprintfA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
UpdateWindow
GetMenu
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
CopyRect
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
GetSystemMetrics
PtInRect
SetRect
DrawIcon
SendMessageA
IsIconic
GetClientRect
InvalidateRect
SetTimer
KillTimer
LoadIconA
EnableWindow
PostQuitMessage
MessageBoxA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
ReuseDDElParam
PostThreadMessageA
GetNextDlgGroupItem
RegisterClipboardFormatA
TabbedTextOutA
FillRect
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetMenuItemBitmaps
GetFocus
ModifyMenuA
MessageBeep
SetWindowContextHelpId
MapDialogRect
CharNextA
UnpackDDElParam
ShowScrollBar
CharUpperA
PostMessageA
SetCursor
ShowOwnedPopups
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
IsWindowVisible
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
CallNextHookEx
SetWindowsHookExA
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
GetMenuState
FindWindowA
gdi32
CreateRectRgnIndirect
CreateFontIndirectA
GetMapMode
DPtoLP
CreateEllipticRgn
LPtoDP
GetTextExtentPoint32A
GetRgnBox
CreateCompatibleBitmap
GetBkColor
GetTextColor
CreateCompatibleDC
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
Ellipse
GetStockObject
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
GetObjectA
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
CreatePalette
SelectPalette
RealizePalette
StretchDIBits
DeleteObject
CreateSolidBrush
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
SHFileOperationA
DragFinish
DragQueryFileA
ShellExecuteExA
comctl32
ord17
ImageList_Destroy
ImageList_Draw
ImageList_GetImageInfo
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
wininet
InternetConnectA
HttpOpenRequestA
InternetSetOptionExA
InternetQueryDataAvailable
InternetCloseHandle
InternetGetLastResponseInfoA
InternetOpenA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
HttpSendRequestA
oledlg
ord8
ole32
CoGetClassObject
CLSIDFromString
CoTaskMemAlloc
StgOpenStorageOnILockBytes
CoTaskMemFree
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromProgID
OleUninitialize
CoRegisterMessageFilter
OleFlushClipboard
CoFreeUnusedLibraries
CoRevokeClassObject
OleInitialize
OleIsCurrentClipboard
oleaut32
VariantChangeType
VariantInit
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocStringByteLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
OleCreateFontIndirect
VariantClear
Sections
.text Size: 240KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ