Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_f3cc8624e01bb4d6037de6426f2014be_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_f3cc8624e01bb4d6037de6426f2014be_icedid.exe
Resource
win10v2004-20240226-en
Target
2024-03-19_f3cc8624e01bb4d6037de6426f2014be_icedid
Size
3.0MB
MD5
f3cc8624e01bb4d6037de6426f2014be
SHA1
fcd80d15303b91adfc0a7b6a37836a96f1014fb9
SHA256
76170ac294240a3776bc589a346a0364ec4dce6aef71262b1d322d7269fe3b39
SHA512
e502d0380e14131be4b1f5ff74f6e42bf37c8197aaf4609e7a714d8aa5cf4d7656836947be8497537370026f8075d96b0bee65c2485880ce1ccd627dc174f1b6
SSDEEP
49152:EAMQ2Gjg2/w5bQWlIwj7bvV+lsKPTlUVZXE:EexBwRtf7b9+lRPTlmZXE
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetThreadLocale
GetShortPathNameA
LocalAlloc
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
MulDiv
GlobalFlags
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
lstrcatA
GetCurrentDirectoryA
SetLastError
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
LockResource
LoadResource
FindResourceA
GetProcessVersion
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileSize
GetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
SetFileAttributesA
SetErrorMode
GetCPInfo
GetOEMCP
GlobalSize
CopyFileA
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetStringTypeExA
GetCommandLineA
ExitThread
RaiseException
HeapReAlloc
HeapSize
GetACP
GetTimeFormatA
GetDateFormatA
FatalAppExitA
HeapDestroy
HeapCreate
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetTimeZoneInformation
IsBadCodePtr
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetConsoleCtrlHandler
SetStdHandle
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFullPathNameA
FindFirstFileA
FindClose
lstrcpyA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
ReadFile
DuplicateHandle
lstrcpynA
lstrlenW
InterlockedDecrement
InterlockedIncrement
lstrlenA
SuspendThread
SetThreadPriority
ResumeThread
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
GetCurrentThreadId
GetWindowsDirectoryA
WideCharToMultiByte
MultiByteToWideChar
VirtualAlloc
ReadProcessMemory
VirtualFree
WriteProcessMemory
SetFilePointer
WriteFile
DeleteFileA
CreateThread
CreateDirectoryA
GetLogicalDrives
GetSystemTime
Module32First
DeviceIoControl
QueryDosDeviceA
FindNextFileA
lstrcmpiA
VirtualProtect
GetUserDefaultLangID
OutputDebugStringA
IsBadReadPtr
DeleteCriticalSection
GetSystemInfo
InitializeCriticalSection
GetProcAddress
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetVersion
WaitForSingleObject
_lclose
_lcreat
CreateFileW
CreateFileA
TerminateProcess
SleepEx
LoadLibraryA
GetTickCount
QueryPerformanceCounter
GetVersionExA
QueryPerformanceFrequency
GetModuleFileNameA
GetFileAttributesA
CreateEventA
CreateProcessA
CloseHandle
IsDebuggerPresent
CreateToolhelp32Snapshot
Process32First
OpenProcess
GetPriorityClass
Process32Next
_lopen
CreateRemoteThread
GetDriveTypeA
GetVolumeInformationA
GetLastError
FormatMessageA
LocalFree
VirtualQuery
SetEvent
GetModuleHandleA
GetStartupInfoA
GetCurrentProcess
LoadStringA
GetSysColorBrush
LoadCursorA
LoadIconA
UpdateWindow
MapWindowPoints
GetSysColor
SetActiveWindow
IsWindow
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetClientRect
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
TrackPopupMenu
SetWindowPlacement
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
wvsprintfA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetFocus
ShowWindow
SetWindowPos
MoveWindow
SetWindowLongA
GetWindowTextLengthA
IsDialogMessageA
ScrollWindowEx
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
SendDlgItemMessageA
GetDlgItemTextA
GetDlgItemInt
GetDlgItem
CheckRadioButton
CheckDlgButton
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ScreenToClient
GetMenuStringA
DeleteMenu
GetMenuItemCount
UnhookWindowsHookEx
GetDesktopWindow
GetWindowTextA
RemoveMenu
AppendMenuA
RemovePropA
DestroyMenu
SetWindowTextA
ClientToScreen
GetWindow
UnregisterClassA
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
GetSystemMetrics
CharUpperA
OemToCharA
CharToOemA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
ShowOwnedPopups
SendMessageA
PostQuitMessage
wsprintfA
SendMessageTimeoutA
MessageBoxA
PostMessageA
FindWindowA
GetWindowThreadProcessId
InsertMenuA
CreatePatternBrush
CreateDIBPatternBrushPt
PtVisible
RectVisible
TextOutA
ExtTextOutA
CreateHatchBrush
GetDCOrgEx
GetObjectA
CopyMetaFileA
CreateDCA
CreateSolidBrush
ExtCreatePen
CreatePen
GetWindowExtEx
GetViewportExtEx
GetDeviceCaps
PlayMetaFile
EnumMetaFile
GetObjectType
PlayMetaFileRecord
ExtSelectClipRgn
SelectClipPath
SetArcDirection
CreateRectRgn
GetClipRgn
PolyBezierTo
SetColorAdjustment
PolylineTo
Escape
CreateBitmap
ArcTo
GetCurrentPositionEx
SetMapperFlags
SetTextCharacterExtra
SetTextJustification
SetTextAlign
LineTo
MoveToEx
OffsetClipRgn
IntersectClipRect
ExcludeClipRect
SelectClipRgn
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
SetBkColor
SelectPalette
GetStockObject
SelectObject
RestoreDC
SaveDC
StartDocA
DeleteDC
DeleteObject
PolyDraw
GetFileTitleA
DocumentPropertiesA
ClosePrinter
OpenPrinterA
FreeSid
RegCreateKeyA
RegSetValueA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
EqualSid
GetTokenInformation
OpenProcessToken
AllocateAndInitializeSid
RegEnumKeyExA
SHGetFileInfoA
SHGetSpecialFolderPathA
DragAcceptFiles
ord17
OleRegGetUserType
WriteClassStg
ReadFmtUserTypeStg
SetConvertStg
CreateBindCtx
OleDuplicateData
CoCreateInstance
CoTaskMemAlloc
CoDisconnectObject
CoTaskMemFree
CoInitialize
ReadClassStg
StringFromCLSID
CoTreatAsClass
ReleaseStgMedium
WriteFmtUserTypeStg
CLSIDFromString
LoadTypeLi
SafeArrayDestroyDescriptor
SafeArrayDestroyData
SafeArrayUnlock
SafeArrayLock
SafeArrayPtrOfIndex
SafeArrayGetElement
SafeArrayPutElement
VariantInit
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayUnaccessData
SafeArrayDestroy
SafeArrayAccessData
SafeArrayCreateVector
VariantCopy
VariantClear
VariantChangeType
SysAllocStringLen
SysReAllocStringLen
SysFreeString
SysAllocString
SysStringLen
SysAllocStringByteLen
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
SafeArrayRedim
SysStringByteLen
VarCyFromStr
VarBstrFromCy
VarDateFromStr
VarBstrFromDate
SafeArrayCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
MapFileAndCheckSumA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE