e:\Build\Jupiter\Branch_license_agent_1_0_1\Jupiter\Jupiter\bin\Release\Verifier.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_8a9c3786b491e38d12b0b554b26794f8_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_8a9c3786b491e38d12b0b554b26794f8_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_8a9c3786b491e38d12b0b554b26794f8_icedid
-
Size
2.5MB
-
MD5
8a9c3786b491e38d12b0b554b26794f8
-
SHA1
d80d84a27f9b82590c454f6327c4f149a7786e6c
-
SHA256
667c1f12b25d258e1fa824647a5dabea1eb21a920315408233930c6c8b8d7cf5
-
SHA512
26282850ce9a35080d9c72935378c8cea7092ca0a402fe66bf46ff8d66c7301d20e295a88a4cb2635b342f92b349312e6ada6d6a1dd1c888bf6df06343f73bed
-
SSDEEP
49152:SuT5CJSCumUIL950fcoB8TiEpAHLAa6yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy4d:SFw0LT0f7BGt7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-19_8a9c3786b491e38d12b0b554b26794f8_icedid
Files
-
2024-03-19_8a9c3786b491e38d12b0b554b26794f8_icedid.exe windows:4 windows x86 arch:x86
6b32864f7d9cfb94ac99f04a5c159864
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
timeGetTime
kernel32
GetFileTime
GlobalFlags
LocalAlloc
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCPInfo
GetOEMCP
FindResourceExA
WritePrivateProfileStringA
SetErrorMode
RtlUnwind
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapReAlloc
ExitThread
CreateThread
HeapSize
QueryPerformanceCounter
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetStdHandle
LCMapStringA
LCMapStringW
SetConsoleCtrlHandler
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
SetEnvironmentVariableA
GetLocaleInfoW
FileTimeToLocalFileTime
FileTimeToSystemTime
ReleaseMutex
CreateMutexA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
MoveFileA
CreateEventA
SuspendThread
SetThreadPriority
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
VirtualProtect
MulDiv
GlobalAlloc
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpynA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetSystemTime
IsValidCodePage
IsDBCSLeadByteEx
GetFullPathNameA
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryW
GetCurrentDirectoryA
DuplicateHandle
CreateFileW
SetFilePointer
FormatMessageA
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
WaitForMultipleObjects
PeekNamedPipe
GetTickCount
GetExitCodeThread
SetLastError
SleepEx
QueryDosDeviceA
DefineDosDeviceA
GetVolumeInformationA
GetDiskFreeSpaceA
DeviceIoControl
GetSystemDirectoryA
GetProcessHeap
HeapAlloc
ExitProcess
HeapFree
FindFirstFileA
FindClose
DeleteFileA
GlobalMemoryStatus
FlushConsoleInputBuffer
GetFileInformationByHandle
CreateDirectoryA
GetDriveTypeA
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
CreateFileA
Sleep
GetFileAttributesA
SetFileAttributesA
LocalFree
WriteFile
EnterCriticalSection
ReadFile
LeaveCriticalSection
GetFileSize
RemoveDirectoryA
SetEvent
LoadLibraryA
GetProcAddress
GetStartupInfoA
GetCurrentProcess
CreateProcessA
ReadProcessMemory
WriteProcessMemory
ResumeThread
TerminateProcess
OpenProcess
WaitForSingleObject
CloseHandle
FreeLibrary
GetModuleHandleA
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
MultiByteToWideChar
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetCurrentProcessId
user32
DestroyMenu
LoadCursorA
GetSysColorBrush
MsgWaitForMultipleObjects
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
MapDialogRect
GetAsyncKeyState
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetTopWindow
GetShellWindow
GetMessageA
TranslateMessage
DispatchMessageA
EnumWindows
GetWindowThreadProcessId
WaitForInputIdle
LoadBitmapA
UnregisterClassA
CharUpperA
SendMessageA
PostMessageA
GetParent
MessageBoxA
EnableWindow
RemovePropA
gdi32
EnumFontFamiliesExA
CreateCompatibleBitmap
GetBitmapBits
GetStockObject
CreateCompatibleDC
PtVisible
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
DeleteObject
CreateFontA
BitBlt
SetMapMode
RestoreDC
SaveDC
CreateDCA
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
RectVisible
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
AllocateAndInitializeSid
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegEnumKeyExA
RegOpenKeyA
RegDeleteKeyA
FreeSid
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
shell32
ShellExecuteA
comctl32
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oleaut32
VariantClear
VariantChangeType
VariantInit
ws2_32
listen
gethostbyaddr
accept
inet_ntoa
WSASetLastError
gethostbyname
WSAGetLastError
socket
connect
setsockopt
getsockopt
inet_addr
bind
WSACleanup
WSAStartup
send
recv
select
ntohs
htons
closesocket
__WSAFDIsSet
ioctlsocket
getsockname
shutdown
imagehlp
MapAndLoad
UnMapAndLoad
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 688KB - Virtual size: 687KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE