Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_4fe1ca0e2bd1a30cb10e36193f3a9e6d_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-23_4fe1ca0e2bd1a30cb10e36193f3a9e6d_icedid.exe
Resource
win10v2004-20240221-en
Target
2024-02-23_4fe1ca0e2bd1a30cb10e36193f3a9e6d_icedid
Size
496KB
MD5
4fe1ca0e2bd1a30cb10e36193f3a9e6d
SHA1
9a95d4c8f8a90c18d3b30358d48e50633ec8ea1b
SHA256
679eee41bd1c25e61a604f1f6564cac2211e0de0192c75371341ca37b7c1d652
SHA512
02247f3cfd09f1b49abe29cd353f15cf9a237f4b0a6e0f45ad3d63999ca4b790f9eac1b9e3f846d805435f28f98bbd7cb9ca0e253db7a29fbde2196f78a41c42
SSDEEP
12288:mkMxGvwWrnnn6WNeMx8e/CK06bP0O4W2G5p/H4ZeH4a:0MIgnnxdu6bP0NW2jZ1a
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Program Files\BCGSoft\BCGControlBarPro\Examples\Et\NtfsDesktopSearch\Release\DesktopSearch.pdb
WriteFile
InitializeCriticalSection
GetSystemDirectoryW
WideCharToMultiByte
TerminateThread
Sleep
SizeofResource
LeaveCriticalSection
FileTimeToSystemTime
ReadFile
CreateFileW
MultiByteToWideChar
GetTempPathW
GetLastError
EnterCriticalSection
FindClose
GetExitCodeThread
LockResource
DeviceIoControl
FindNextFileW
DeleteCriticalSection
CloseHandle
FileTimeToLocalFileTime
DeleteFileW
DebugBreak
GetSystemTime
GetVolumeInformationW
CreateThread
GetFileInformationByHandle
SystemTimeToFileTime
LocalFileTimeToFileTime
HeapAlloc
HeapFree
HeapDestroy
HeapCreate
HeapSize
SetFilePointerEx
CreateFileA
GetProcessHeap
GetModuleHandleW
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
InitializeCriticalSectionAndSpinCount
SetFilePointer
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLogicalDriveStringsW
LoadResource
FindResourceW
GetDriveTypeW
FindFirstFileW
GetModuleHandleA
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
GetConsoleMode
GetConsoleCP
ExitProcess
GetCurrentThreadId
SetLastError
TlsFree
SetEndOfFile
GetFileSize
TlsSetValue
TlsAlloc
TlsGetValue
GetProcAddress
IsValidCodePage
GetOEMCP
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
SendMessageW
MessageBoxW
SetWindowTextA
CheckMenuItem
MoveWindow
DispatchMessageW
GetSystemMetrics
GetDlgItemInt
IsDlgButtonChecked
SetWindowTextW
CreateWindowExW
DestroyWindow
ScreenToClient
GetWindowRect
GetMessageW
PostQuitMessage
TrackPopupMenu
PostMessageW
KillTimer
GetSubMenu
GetClientRect
ModifyMenuW
wsprintfW
TranslateMessage
GetMenu
IsDialogMessageW
LoadIconW
MessageBoxA
InvalidateRect
LoadMenuW
GetWindowLongW
GetWindowTextW
GetDlgItem
SetWindowLongW
SetWindowPos
GetCursorPos
ShowWindow
CreateDialogParamW
DrawMenuBar
IsWindow
RegSetValueExW
RegCloseKey
RegOpenKeyW
RegCreateKeyW
SHFileOperationW
SHGetFileInfoW
ShellExecuteW
SHGetFolderPathA
SHBrowseForFolderW
SHGetPathFromIDListW
ShellExecuteExW
CoUninitialize
CoInitialize
CoCreateInstance
CreateStatusWindowW
SkinH_Attach
sqlite3_exec
sqlite3_open
sqlite3_close
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ