m:\BIEW\PJ_SP-BIEW0807\Packages\Tools\AutoRunUpgrade\Src\Temp\CancelAutoPlay\Rel\CancelAutoplay.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_51c08c1ad85485e78be3ca6ed31d443d_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_51c08c1ad85485e78be3ca6ed31d443d_icedid.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-24_51c08c1ad85485e78be3ca6ed31d443d_icedid
-
Size
220KB
-
MD5
51c08c1ad85485e78be3ca6ed31d443d
-
SHA1
7ab376b9cf7d6459ac48eb6f9aa8d02b106d3999
-
SHA256
9052e0166540051e87b1a640cf64c0de1e2ed52525ee267385d7ffac0b0da1f4
-
SHA512
d35dd1652f702392612783d02f2b278d6a1897976f95a61038197a40f7e813d0a4f4c9d23163485b0934074ca072e2a1dd4a0c03b05863327d94cf6481f27d1f
-
SSDEEP
3072:YPGjkpRyAkK9LhFaEvLAWn2StsdI8Bpl2J1bKM7ylbTQEPgYD:tyRyk9bvAG+I+plqLsTQEP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-24_51c08c1ad85485e78be3ca6ed31d443d_icedid
Files
-
2024-02-24_51c08c1ad85485e78be3ca6ed31d443d_icedid.exe windows:4 windows x86 arch:x86
331a3bd271b174813788b069a4494580
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileTime
SetErrorMode
GetCPInfo
GetOEMCP
ExitProcess
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
TerminateProcess
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetFileAttributesA
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
GetDriveTypeA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetCurrentDirectoryA
lstrcatA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
ReleaseMutex
CreateMutexA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
DeleteCriticalSection
InitializeCriticalSection
RaiseException
SetLastError
GlobalFree
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
WritePrivateProfileStringA
CloseHandle
GlobalAddAtomA
GetCurrentThread
GlobalLock
GlobalAlloc
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
CreateDirectoryA
CreateFileA
DeleteFileA
OutputDebugStringA
FindResourceA
LoadResource
LockResource
SizeofResource
GetLocalTime
LoadLibraryA
GetProcAddress
CreateThread
CreateFileMappingA
GetCurrentProcessId
OpenFileMappingA
MapViewOfFile
CreateEventA
WaitForSingleObject
GetCurrentThreadId
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
HeapDestroy
GetVersionExA
user32
DestroyMenu
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
ShowWindow
SetWindowLongA
GetDlgItem
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DispatchMessageA
TranslateMessage
GetMessageA
CharUpperA
PostMessageA
PostQuitMessage
SetCursor
SendMessageA
EnableWindow
UnhookWindowsHookEx
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowTextA
SetWindowTextA
GetClassNameA
LoadCursorA
GetCapture
ClientToScreen
GetSystemMetrics
UnregisterClassA
GetMenuItemID
CopyRect
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
MessageBoxA
ValidateRect
GetCursorPos
PeekMessageA
GetKeyState
IsWindowVisible
GetActiveWindow
CallNextHookEx
SetWindowsHookExA
LoadBitmapA
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
GetFocus
SetMenuItemBitmaps
GetMenuItemCount
GetSubMenu
wsprintfA
gdi32
GetStockObject
DeleteDC
ExtTextOutA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
CreateBitmap
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
Escape
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegCreateKeyExA
RegCloseKey
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoInitialize
GetRunningObjectTable
CreateClassMoniker
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 136KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ