D:\Development-2010\MaxResearch\Output\Win32\Release\Binaries\SMTService.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_3da80d31d6d0296ffef30b7e0e00316f_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_3da80d31d6d0296ffef30b7e0e00316f_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_3da80d31d6d0296ffef30b7e0e00316f_icedid
-
Size
425KB
-
MD5
3da80d31d6d0296ffef30b7e0e00316f
-
SHA1
fb7bb5c86c48d048e2dcbd1ddb942c12fe9b853c
-
SHA256
3e80d3737e86e0a64d66fbe26f9e60d16ff1adeee718e137a1af364c626a233b
-
SHA512
8c6a3ae111849d84e23c320882db7108d866956b37b344e7f7803eef094f94c7087c8c05ca1f796e9220f2631855d1385e5b7e6ce0df0516e65aebdbaa0b6db2
-
SSDEEP
12288:1WEJbKkDBu1Y5x5IUbpKv9xrD7uUvOlMC:1TJumBbbyxP7uYXC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-19_3da80d31d6d0296ffef30b7e0e00316f_icedid
Files
-
2024-03-19_3da80d31d6d0296ffef30b7e0e00316f_icedid.exe windows:5 windows x86 arch:x86
d5f172ab2804f2e677ef3e9f24ba5a00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
userenv
CreateEnvironmentBlock
wtsapi32
WTSQueryUserToken
kernel32
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
InitializeCriticalSectionAndSpinCount
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetProcessHeap
SetEnvironmentVariableA
OutputDebugStringW
FreeEnvironmentStringsW
CloseHandle
Process32NextW
GetLastError
ProcessIdToSessionId
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
WTSGetActiveConsoleSessionId
MultiByteToWideChar
FindResourceW
SizeofResource
LockResource
LoadResource
GetVersionExW
FreeLibrary
GetProcAddress
LoadLibraryW
TerminateProcess
GetCurrentProcess
GetLongPathNameW
CreateRemoteThread
ExitProcess
WinExec
GlobalFree
GlobalAlloc
lstrlenW
GetModuleHandleW
SetFileAttributesW
DeleteFileW
Sleep
GetTickCount
LocalAlloc
GetModuleFileNameA
GetStdHandle
VirtualQuery
VirtualAlloc
VirtualProtect
HeapSize
HeapReAlloc
CreateThread
ExitThread
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetLogicalDrives
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetLocalTime
RtlUnwind
GetStartupInfoW
GetFileTime
GetFileSizeEx
GetFileAttributesW
FileTimeToLocalFileTime
SetErrorMode
FileTimeToSystemTime
GetFullPathNameW
FindFirstFileW
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalFindAtomW
LoadLibraryA
GetVersionExA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
LocalFree
GetCurrentProcessId
GetSystemInfo
GetComputerNameW
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetVolumeInformationW
CompareStringW
GlobalFlags
GetModuleHandleA
InterlockedDecrement
lstrlenA
GlobalUnlock
FormatMessageW
MulDiv
FreeResource
WritePrivateProfileStringW
GlobalAddAtomW
CreateEventW
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetWindowsDirectoryW
lstrcmpA
CompareStringA
WideCharToMultiByte
InterlockedExchange
GlobalLock
lstrcmpW
GetDiskFreeSpaceExW
SetLastError
CreateProcessW
WaitForSingleObject
GetModuleFileNameW
CreateFileW
DeviceIoControl
GetEnvironmentVariableW
GetTempPathW
GetSystemDirectoryW
GlobalMemoryStatus
GetSystemDefaultLCID
GetLocaleInfoW
user32
UnregisterClassW
DestroyMenu
MessageBeep
GetNextDlgTabItem
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableW
SetRect
IsRectEmpty
CharNextW
CharUpperW
GetSysColorBrush
ShowWindow
MoveWindow
IsDialogMessageW
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageW
WinHelpW
IsChild
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
SetFocus
GetForegroundWindow
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
GetClientRect
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
SetWindowLongW
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
ReleaseCapture
LoadCursorW
GetCapture
SetCapture
GetDesktopWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
GetWindowTextW
SetWindowTextW
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
UnhookWindowsHookEx
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
EndDialog
CreateDialogIndirectParamW
RegisterClipboardFormatW
IsWindowEnabled
EnableWindow
PostThreadMessageW
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
SendMessageW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
PostMessageW
PostQuitMessage
GetProcessWindowStation
OpenWindowStationW
SetProcessWindowStation
CloseWindowStation
OpenDesktopW
CloseDesktop
GetSystemMetrics
ExitWindowsEx
SendDlgItemMessageA
gdi32
GetStockObject
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectW
DeleteObject
GetClipBox
SetMapMode
SetTextColor
CreateBitmap
GetDeviceCaps
SaveDC
CreateRectRgnIndirect
SetBkColor
RestoreDC
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegSetKeySecurity
RegQueryValueW
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
ImpersonateLoggedOnUser
RevertToSelf
CheckTokenMembership
GetCurrentHwProfileW
LockServiceDatabase
ChangeServiceConfig2W
UnlockServiceDatabase
RegisterServiceCtrlHandlerW
SetServiceStatus
AllocateAndInitializeSid
EqualSid
FreeSid
QueryServiceConfigW
DeleteService
CreateServiceW
QueryServiceStatus
StartServiceCtrlDispatcherW
RegEnumKeyW
RegGetKeySecurity
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CreateProcessAsUserW
RegUnLoadKeyW
RegLoadKeyW
RegCreateKeyExW
RegRestoreKeyW
RegSaveKeyW
RegOpenKeyW
RegEnumValueW
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
StartServiceW
OpenSCManagerW
OpenServiceW
ControlService
CloseServiceHandle
GetTokenInformation
LookupAccountSidW
OpenProcessToken
LookupPrivilegeValueW
DuplicateTokenEx
SetTokenInformation
AdjustTokenPrivileges
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetFolderPathW
comctl32
ord17
shlwapi
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsUNCW
StrStrIW
oledlg
OleUIBusyW
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoFreeUnusedLibraries
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
OleUninitialize
CoRegisterMessageFilter
oleaut32
VarUdateFromDate
SysFreeString
VariantCopy
SysAllocString
SafeArrayDestroy
OleCreateFontIndirect
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SystemTimeToVariantTime
SysStringLen
VariantTimeToSystemTime
ws2_32
inet_ntoa
gethostbyname
gethostname
WSAStartup
WSACleanup
Sections
.text Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ