i:\projects\skidrush\trunk\Dev\Tool\SkidRushLauncher\Bin_KR\Launcher.pdb
Behavioral task
behavioral1
Sample
2024-03-15_ab89e6d6288c8210e55333903ae6278a_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_ab89e6d6288c8210e55333903ae6278a_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_ab89e6d6288c8210e55333903ae6278a_icedid
-
Size
652KB
-
MD5
ab89e6d6288c8210e55333903ae6278a
-
SHA1
ecb9535590b620e7b7bf54e075848f7b9931e478
-
SHA256
9ef0859abb9f7c44d8b1c64fa045b96f26e262028c4712d1008aa4212f4777dc
-
SHA512
e2ba9afaf5ee25c7717746d777b4ecba7cf18a2d4447dddce4e398d744e8e1b99a5997124e6d805676ffcd2c8a2de33cd1d4274e63334928c15ca45501a880bb
-
SSDEEP
12288:XjEpMd167OhbygWoLs1yl+7XTMy5afwzHiwco0LDAAAWKFPQTDBO/y7Lo2Ts9Fwg:QU47OY/oLs1yl+7XH5ao/kMAAxo/7LoL
Malware Config
Signatures
Files
-
2024-03-15_ab89e6d6288c8210e55333903ae6278a_icedid.exe windows:4 windows x86 arch:x86
6274f3557d1d04412d534f6de2700549
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCloseHandle
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
HttpQueryInfoA
InternetOpenUrlA
InternetConnectA
InternetOpenA
FtpSetCurrentDirectoryA
FtpCreateDirectoryA
FtpPutFileA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
winmm
timeGetTime
dsetup
ord11
kernel32
WideCharToMultiByte
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
InterlockedExchange
CreateProcessA
FindResourceA
SizeofResource
LockResource
LoadResource
MoveFileA
Sleep
DeleteFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
ReadFile
GetFileSize
LoadLibraryA
GetProcAddress
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
lstrcpyA
GetCurrentDirectoryA
FindFirstFileA
FindNextFileA
CopyFileA
GetWindowsDirectoryA
GetSystemDirectoryA
EnterCriticalSection
CreateFileA
SetFilePointer
WriteFile
LeaveCriticalSection
GetModuleFileNameA
GetCurrentThreadId
GetLocalTime
RaiseException
DeleteCriticalSection
InitializeCriticalSection
lstrlenA
lstrcmpiA
lstrlenW
CompareStringA
CompareStringW
GetVersion
MultiByteToWideChar
CreateThread
GetDiskFreeSpaceExA
GetExitCodeProcess
CloseHandle
GetExitCodeThread
GetCommandLineA
GetTempPathA
GetTickCount
GetCurrentProcessId
FormatMessageA
LocalFree
CreateDirectoryA
ExitThread
OutputDebugStringA
GetLocaleInfoW
SetEnvironmentVariableA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
QueryPerformanceFrequency
QueryPerformanceCounter
CreateMutexA
GetLastError
GetFileAttributesExA
FreeResource
GlobalFree
GlobalUnlock
GlobalLock
GetModuleHandleA
lstrcpynA
lstrcmpW
lstrcatA
FreeLibrary
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
SetLastError
MulDiv
InterlockedIncrement
GlobalAlloc
WaitForSingleObject
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
FindClose
GetVolumeInformationA
GetFullPathNameA
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalAlloc
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
SetFileAttributesA
GetFileAttributesA
GetFileTime
EnumResourceLanguagesA
ConvertDefaultLocale
lstrcmpA
GetCurrentThread
WritePrivateProfileStringA
InterlockedDecrement
GlobalFlags
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
ExitProcess
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetStartupInfoA
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDriveTypeA
GetStringTypeA
user32
GetWindowTextA
GetWindowTextLengthA
IsChild
GetFocus
SendDlgItemMessageA
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassInfoExA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetCapture
WinHelpA
RegisterWindowMessageA
IsDialogMessageA
SetWindowTextA
MoveWindow
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
FillRect
TabbedTextOutA
DrawTextExA
GrayStringA
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
CharNextA
IsRectEmpty
SetWindowRgn
SetCapture
LoadCursorA
SetCursor
ReleaseCapture
GetCursorPos
TranslateAcceleratorA
SetMenu
BringWindowToTop
SetRectEmpty
GetForegroundWindow
InsertMenuItemA
LoadAcceleratorsA
DestroyMenu
LoadMenuA
ReuseDDElParam
UnpackDDElParam
wsprintfA
ValidateRect
TranslateMessage
GetMessageA
PostQuitMessage
ShowOwnedPopups
MapDialogRect
SetWindowContextHelpId
WindowFromPoint
GetSysColorBrush
InflateRect
GetMenuItemInfoA
SetRect
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
PeekMessageA
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetLastActivePopup
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessagePos
GetMessageTime
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
IsWindowVisible
GetParent
LoadImageA
LoadBitmapA
UnregisterClassA
CharUpperA
KillTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
DrawTextA
PostMessageA
SendMessageA
GetWindowRect
SetTimer
UpdateWindow
InvalidateRect
FindWindowA
ShowWindow
SetFocus
SetForegroundWindow
SetActiveWindow
LoadIconA
MessageBoxA
GetDC
ReleaseDC
EnableWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
CreatePopupMenu
gdi32
DeleteObject
SelectClipRgn
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
SetMapMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
GetClipBox
RectVisible
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetRgnBox
GetMapMode
CreateRectRgnIndirect
CreateFontIndirectA
GetTextExtentPoint32A
Ellipse
LPtoDP
CreateEllipticRgn
GetTextColor
GetBkColor
CreateSolidBrush
CreatePatternBrush
ExtSelectClipRgn
SetBitmapBits
GetObjectA
CreateCompatibleBitmap
CreateFontA
CombineRgn
CreateRectRgn
ExtCreateRegion
DeleteDC
GetStockObject
CreateICA
GetDeviceCaps
TextOutA
SetTextColor
BitBlt
CreateCompatibleDC
CreateBitmap
GetDIBits
advapi32
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
CryptHashData
CryptDeriveKey
CryptGetHashParam
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptEncrypt
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderPathA
DragQueryFileA
DragFinish
ole32
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
OleInitialize
oleaut32
OleCreateFontIndirect
VariantCopy
DispCallFunc
LoadRegTypeLi
SysStringLen
SafeArrayDestroy
VariantInit
SafeArrayAccessData
SafeArrayGetElemsize
SysFreeString
VariantClear
SysAllocStringLen
SysAllocString
VariantChangeType
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayUnaccessData
SafeArrayCreate
SysAllocStringByteLen
msimg32
TransparentBlt
comctl32
_TrackMouseEvent
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
shlwapi
PathFileExistsA
PathIsUNCA
UrlUnescapeA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
oledlg
ord8
oleacc
CreateStdAccessibleObject
AccessibleObjectFromWindow
LresultFromObject
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
comdlg32
GetFileTitleA
Exports
Exports
??0CCrc16@FnlApi@@AAE@ABV01@@Z
??0CCrc16@FnlApi@@QAE@XZ
??0CCrc32@FnlApi@@AAE@ABV01@@Z
??0CCrc32@FnlApi@@QAE@XZ
??0CMd5@FnlApi@@AAE@ABV01@@Z
??0CMd5@FnlApi@@QAE@XZ
??0CRc4Md5@FnlApi@@AAE@ABV01@@Z
??0CRc4Md5@FnlApi@@QAE@XZ
??1CRc4Md5@FnlApi@@QAE@XZ
??4CCrc16@FnlApi@@AAEAAV01@ABV01@@Z
??4CCrc32@FnlApi@@AAEAAV01@ABV01@@Z
??4CMd5@FnlApi@@AAEAAV01@ABV01@@Z
??4CRc4Md5@FnlApi@@AAEAAV01@ABV01@@Z
?CalcCrc@CCrc16@FnlApi@@QBEGPBEKG@Z
?CalcCrc@CCrc32@FnlApi@@QBEKPBEKK@Z
?Close@CRc4Md5@FnlApi@@QAEXXZ
?Decode@CRc4Md5@FnlApi@@QAEKPAEAAKH@Z
?Encode@CRc4Md5@FnlApi@@QAEKPAEAAKH@Z
?Final@CMd5@FnlApi@@QAEXQAE@Z
?GetDigest@CRc4Md5@FnlApi@@QAEKPAE@Z
?GetLngDigest@CRc4Md5@FnlApi@@SAKXZ
?Initial@CMd5@FnlApi@@QAEXQBI@Z
?IsOpen@CRc4Md5@FnlApi@@QBEHXZ
?Open@CRc4Md5@FnlApi@@QAEKPBDPBEK@Z
?SetPolynomial@CCrc16@FnlApi@@QAEXG@Z
?SetPolynomial@CCrc32@FnlApi@@QAEXK@Z
?Update@CMd5@FnlApi@@QAEXPBEK@Z
?__Dtor@CRc4Md5@FnlApi@@AAEXXZ
?__Reflect@CCrc32@FnlApi@@ABEKKD@Z
?__ResetAttr@CCrc16@FnlApi@@AAEXXZ
?__ResetAttr@CCrc32@FnlApi@@AAEXXZ
?__ResetAttr@CMd5@FnlApi@@AAEXXZ
?__ResetAttr@CRc4Md5@FnlApi@@AAEXXZ
?__Transform@CMd5@FnlApi@@AAEXQAIQBI@Z
?__mAlgEncrypt@CRc4Md5@FnlApi@@0IB
?__mAlgHash@CRc4Md5@FnlApi@@0IB
?__mLngDigest@CRc4Md5@FnlApi@@0KB
?__mLngSesKey@CRc4Md5@FnlApi@@0KB
Sections
.text Size: 504KB - Virtual size: 502KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ