d:\P4\rc1850\build\Ahmbed\vc8.0\obj\Release\bin\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe
Resource
win7-20240221-en
General
-
Target
2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid
-
Size
3.1MB
-
MD5
16d0e74a32f973c2e9b13c8e7736c5f5
-
SHA1
840913164d709d5e31a509571c6fcc185d6e1740
-
SHA256
697ed9f1fe678a7861cce39407289d6ab2c818716a46c552430cde9b7028e770
-
SHA512
5671b0eeb3198edb9082ef0d6cc88bf276475357d849086722548a06d6a527a7c69cc6d0e84b37c45c6a4b185e5c5c8f9a7cb6896bb91eabceba7403bfc5091a
-
SSDEEP
49152:dw7cq43rhAmZLPYf4kpUJWDQ7cSwMuIdhgT/g9cRw9QrtWOs6Q:4KLQfHuV7nwdWciqrEr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid
Files
-
2024-03-09_16d0e74a32f973c2e9b13c8e7736c5f5_icedid.exe windows:4 windows x86 arch:x86
a04acf2953a448366bff9f70d2a6073a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathFindExtensionW
PathIsFileSpecW
PathQuoteSpacesW
SHCreateStreamOnFileW
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
PathMakePrettyW
PathStripPathW
PathIsRelativeW
PathRemoveBackslashW
PathStripToRootW
PathAddBackslashW
PathIsRootW
PathFileExistsW
PathIsUNCW
PathGetCharTypeW
wsock32
socket
closesocket
WSAStartup
WSACleanup
htons
bind
kernel32
InterlockedDecrement
ResumeThread
GlobalAddAtomW
GetCurrentProcessId
WritePrivateProfileStringW
RaiseException
FreeResource
GetVersionExA
LoadLibraryA
CompareStringW
GlobalFindAtomW
GetModuleHandleA
InterlockedIncrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
MoveFileW
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetFullPathNameW
FileTimeToSystemTime
lstrlenA
FileTimeToLocalFileTime
GetFileTime
HeapFree
HeapAlloc
ConvertDefaultLocale
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapReAlloc
SetStdHandle
GetFileType
GetSystemTimeAsFileTime
ExitProcess
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
VirtualQuery
HeapSize
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetOEMCP
Sleep
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetTimeFormatA
GetDateFormatA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
DeleteFileA
GetFileAttributesA
GetTempPathA
LockFileEx
GetFullPathNameA
OutputDebugStringA
PulseEvent
CreateEventA
QueryPerformanceFrequency
GetLogicalDrives
GetStringTypeExA
InterlockedCompareExchange
CreateMutexA
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
GlobalDeleteAtom
GetModuleHandleW
GlobalFree
GlobalAlloc
MulDiv
SetFilePointer
SetFilePointerEx
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetSystemDirectoryW
CreateProcessW
GetExitCodeProcess
FindResourceW
GlobalLock
GlobalUnlock
RemoveDirectoryW
GetTickCount
CreateDirectoryW
GetLogicalDriveStringsW
GetSystemWindowsDirectoryW
GetSystemInfo
IsProcessorFeaturePresent
GlobalMemoryStatusEx
GetStdHandle
GetCommandLineW
GetProcAddress
GetConsoleWindow
FreeConsole
GetFileAttributesExW
lstrcatW
FormatMessageW
GetVersionExW
GetCurrentThread
GetCurrentProcess
LocalAlloc
LocalFree
GetThreadLocale
SizeofResource
GetTempFileNameW
Process32FirstW
OpenProcess
Process32NextW
Thread32First
Thread32Next
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
GetUserDefaultLangID
SetLastError
ReleaseMutex
GetModuleFileNameW
LoadLibraryW
FindResourceExW
LoadResource
LockResource
GetUserDefaultLCID
FreeLibrary
FindFirstFileW
FindNextFileW
FindClose
GetLogicalDriveStringsA
GetDriveTypeA
GetFileSize
ReadFile
GetTempPathW
GetCurrentDirectoryW
lstrcpyW
SetErrorMode
GetVolumeInformationW
SetCurrentDirectoryW
SetFileAttributesW
DeleteFileW
GetFileAttributesW
GetDriveTypeW
GetDiskFreeSpaceExW
lstrlenW
MultiByteToWideChar
GetACP
WideCharToMultiByte
CreateMutexW
GetLastError
WaitForSingleObject
GetSystemTime
WriteFile
FlushFileBuffers
CopyFileW
CreateFileW
GetFileSizeEx
CloseHandle
GetShortPathNameW
CreateSemaphoreA
ReleaseSemaphore
SetEnvironmentVariableW
GetCurrentDirectoryA
GetProcessHeap
user32
FindWindowA
GetClassNameA
LoadStringA
EnumWindows
SetWindowsHookExA
MessageBoxIndirectW
DialogBoxParamW
PostMessageA
EnableScrollBar
CallWindowProcA
PeekMessageA
IsDialogMessageA
DispatchMessageA
SetWindowLongA
CreateDialogParamW
GetWindowLongA
GetWindowTextA
LoadImageA
SendMessageA
EnumDisplayMonitors
GetMonitorInfoA
KillTimer
SetTimer
CharNextW
PostThreadMessageW
CharUpperW
UnregisterClassW
LoadCursorW
GetSysColorBrush
MessageBeep
GetNextDlgGroupItem
SetWindowContextHelpId
MapDialogRect
ReleaseCapture
SetCapture
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
FillRect
DestroyMenu
ShowWindow
MoveWindow
IsDialogMessageW
IsDlgButtonChecked
SetDlgItemTextW
GetDlgItemTextW
CheckDlgButton
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
UnregisterClassA
GetWindowTextW
GetWindowTextLengthW
EnumThreadWindows
SendMessageW
EnableWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
UpdateWindow
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
RegisterWindowMessageW
RegisterClipboardFormatW
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
MessageBoxW
GetDesktopWindow
GetSystemMetrics
RemoveMenu
GetSystemMenu
IsIconic
GetClientRect
LoadIconW
PostMessageW
GetAsyncKeyState
ExitWindowsEx
CloseClipboard
GetClipboardData
OpenClipboard
IsClipboardFormatAvailable
EnableMenuItem
GetWindowRect
GetForegroundWindow
SetFocus
SetWindowPos
SetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
SetWindowTextW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
UnhookWindowsHookEx
CheckMenuItem
ModifyMenuW
GetParent
GetFocus
LoadBitmapW
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetCapture
gdi32
RestoreDC
SaveDC
ExtTextOutW
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
Ellipse
CreateFontIndirectA
GetTextExtentPoint32A
GetMapMode
GetTextColor
GetBkColor
GetRgnBox
CreateRectRgnIndirect
CreateSolidBrush
GetDeviceCaps
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
MoveToEx
LineTo
SetMapMode
EnumFontFamiliesExA
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
OpenThreadToken
AddAccessAllowedAce
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
SetNamedSecurityInfoW
SetEntriesInAclW
GetNamedSecurityInfoW
ImpersonateSelf
SetSecurityDescriptorDacl
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
FreeSid
RevertToSelf
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
InitializeAcl
shell32
ord92
SHBrowseForFolderW
ShellExecuteW
ord165
SHGetFileInfoW
CommandLineToArgvW
SHGetFolderLocation
SHCreateDirectoryExW
SHGetPathFromIDListW
SHGetFolderPathW
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteExW
ord75
comctl32
ord17
oledlg
OleUIBusyW
ole32
CoTaskMemAlloc
CoInitializeEx
CoTaskMemFree
CLSIDFromProgID
CoInitialize
CoUninitialize
CoCreateInstance
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoGetClassObject
OleRun
StgOpenStorageOnILockBytes
CLSIDFromString
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
GetErrorInfo
OleCreateFontIndirect
SysFreeString
VariantClear
VariantCopy
VariantInit
SysAllocString
SysStringLen
OleCreatePictureIndirect
SysAllocStringByteLen
SysStringByteLen
VariantChangeType
SysAllocStringLen
DispCallFunc
LoadRegTypeLi
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
psapi
GetModuleFileNameExW
rpcrt4
RpcStringFreeW
UuidToStringW
UuidCreate
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 440KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 992KB - Virtual size: 996KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE