c:\Projects\KidstyR3\PhoneBrowserStarter\PBStarter\Release\StartVMCLite.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_9ca0147f6811a47d59ea7730d5a94957_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_9ca0147f6811a47d59ea7730d5a94957_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_9ca0147f6811a47d59ea7730d5a94957_icedid
-
Size
200KB
-
MD5
9ca0147f6811a47d59ea7730d5a94957
-
SHA1
7a68738bf402f3a6548b155a103d7b9a55734956
-
SHA256
8de645cfad93b0d470bfedba0121669e93e93810837a63be6bb54b966abe8809
-
SHA512
6b1fb0b629321c09198a718d9bda797abd39fe1f3bd8804f583d0cc3d63f8623d593105a6e8110d5704089e2fcbd5aaf306318899799bfc2a08927b535fee3e4
-
SSDEEP
3072:hBRf6tb6broOaw1o9kA6934P75PNqvrS2y5XwKuZJn63PqatcY/wD:1CN7pw15vs7HarSvJwKuZJ6OY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-12_9ca0147f6811a47d59ea7730d5a94957_icedid
Files
-
2024-03-12_9ca0147f6811a47d59ea7730d5a94957_icedid.exe windows:4 windows x86 arch:x86
78fec91bccb31ecebb239102168e3e8b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStartupInfoW
ExitProcess
RtlUnwind
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
TerminateProcess
SetStdHandle
GetFileType
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
IsBadWritePtr
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetOEMCP
GetCPInfo
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalFindAtomW
GetVersionExA
GetModuleHandleA
GlobalFlags
WritePrivateProfileStringW
SetErrorMode
lstrcatW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
InterlockedDecrement
GetFileTime
GetFileAttributesW
FileTimeToLocalFileTime
FileTimeToSystemTime
LoadLibraryA
GlobalAddAtomW
GetCurrentThread
lstrcmpW
FreeLibrary
GlobalDeleteAtom
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
LoadLibraryW
GetProcAddress
GetModuleFileNameW
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
SetLastError
GlobalFree
lstrcpyW
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
lstrcpynW
LocalFree
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CreateProcessW
WaitForSingleObject
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
GetLocaleInfoW
GetCommandLineW
GetDriveTypeW
CreateMutexW
ReleaseMutex
GetTickCount
GetCurrentThreadId
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
GetLastError
CreateFileW
ReadFile
CloseHandle
GetModuleHandleW
GetUserDefaultLangID
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
GetStartupInfoA
InterlockedExchange
user32
DestroyMenu
RegisterWindowMessageW
WinHelpW
CreateWindowExW
GetClassInfoExW
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconW
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoW
RegisterClassW
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
ShowWindow
SetWindowLongW
GetDlgItem
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
SetWindowTextW
GetClassNameW
GetCapture
ClientToScreen
GetWindowTextW
UnhookWindowsHookEx
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SetMenuItemBitmaps
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapW
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
GetParent
CopyRect
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
SendMessageW
SetCursor
PostQuitMessage
PostMessageW
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnregisterClassW
GetForegroundWindow
MessageBoxW
LoadStringW
wsprintfW
gdi32
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
GetDeviceCaps
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
Escape
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegQueryValueExW
RegOpenKeyW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyW
RegQueryValueW
RegCloseKey
shell32
ord680
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
comctl32
ord17
shlwapi
StrStrW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathAppendW
PathFindFileNameW
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ