Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_00bedeada90b29f56c10ea6e975770c4_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-24_00bedeada90b29f56c10ea6e975770c4_icedid.exe
Resource
win10v2004-20240221-en
Target
2024-02-24_00bedeada90b29f56c10ea6e975770c4_icedid
Size
187KB
MD5
00bedeada90b29f56c10ea6e975770c4
SHA1
641173eb8044e48f44d530db9f6eb22153d26dcf
SHA256
8f0690f3873ae11eaa74ca4c1236f8b3dcee74a4ca08cf88a13e9c82d3308964
SHA512
9d79612812d9c1f5efb8c3835612916802d98bc187c5a82d425d19f998d79aa2df9084826c6ccabc6efcd0dbcfd69e1cee29ce004f7da29de1fd2c06d4d25abf
SSDEEP
3072:NFbcqphs6nVhnf8CFFdSqgVLbk63oKE4pBwr73p0nAwEQRSawqc:N5Fhs6vf8CF/SqULbk63o/47BJs9
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageNetscapeServerGatedCrypto
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\KINGSOFT_DUBA\Build\Build_Src\kdrivergenius\kis_defend_frame_wps_fb\product\win32\dbginfo\ksstup.pdb
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
IsDebuggerPresent
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
FlushFileBuffers
SetFilePointer
WriteFile
InterlockedExchange
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExA
GetModuleHandleA
GetCurrentThreadId
GlobalFlags
lstrcmpW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetThreadLocale
GetVersion
InterlockedDecrement
InterlockedIncrement
SetLastError
WideCharToMultiByte
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
DeleteCriticalSection
MultiByteToWideChar
InitializeCriticalSection
lstrcpyA
ReadFile
GetPrivateProfileStringW
lstrlenA
LoadResource
FindResourceW
SizeofResource
LockResource
LocalFree
CreateToolhelp32Snapshot
Process32NextW
LocalAlloc
Process32FirstW
LoadLibraryW
Sleep
MoveFileExW
lstrlenW
OpenProcess
LoadLibraryA
FindFirstFileW
CreateProcessW
FreeLibrary
FindClose
GetCurrentProcessId
GetLastError
DeleteFileW
FindNextFileW
CreateFileW
WaitForSingleObject
GetModuleFileNameW
CopyFileW
CloseHandle
RemoveDirectoryW
ExpandEnvironmentStringsW
MoveFileW
SetFileAttributesW
lstrcmpiW
GetSystemDirectoryW
GetProcAddress
GetModuleHandleW
GetVersionExW
GetEnvironmentStrings
GetCurrentProcess
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CheckMenuItem
SystemParametersInfoA
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
SetWindowPos
SetWindowLongW
IsWindow
GetDlgItem
EnableMenuItem
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
CallWindowProcW
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
GetWindowTextW
UnhookWindowsHookEx
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
wsprintfW
IsIconic
UnregisterClassA
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
GetDeviceCaps
DeleteObject
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
SelectObject
DocumentPropertiesW
OpenPrinterW
ClosePrinter
FreeSid
AllocateAndInitializeSid
DuplicateTokenEx
SetTokenInformation
EqualSid
GetTokenInformation
CreateProcessAsUserW
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
ControlService
QueryServiceStatus
StartServiceW
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyW
SHGetFolderPathW
SHCreateDirectoryExW
VariantInit
VariantClear
VariantChangeType
GetModuleFileNameExW
EnumProcesses
GetProcessImageFileNameW
PathFileExistsW
SHDeleteKeyW
PathFindFileNameW
PathAppendW
PathIsUNCW
StrStrIA
PathRemoveFileSpecW
WTSFreeMemory
WTSEnumerateSessionsW
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoSizeW
LresultFromObject
CreateStdAccessibleObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE