e:\Build\Jupiter\Branch_license_agent_2_1_0\Jupiter\Jupiter\bin\Release\Verifier.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_18072b3de7b47ed0e58af19b6ed0db57_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_18072b3de7b47ed0e58af19b6ed0db57_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_18072b3de7b47ed0e58af19b6ed0db57_icedid
-
Size
1.5MB
-
MD5
18072b3de7b47ed0e58af19b6ed0db57
-
SHA1
43635888bf715ee1ffde7ebd15983688b98779d0
-
SHA256
725e1c9d011c318cd3b11c6b2be0bca8974e6ed19fc89df83da320a4f0420050
-
SHA512
d93e26ea0395e024e521bf68d34051bcf726e97bd3cf938ec54f5848b51bad6e2a831c7b5ee4f7c8803bac47acb38b7b4eda22f69ca3269deb50ef1f244560c1
-
SSDEEP
24576:wVfDplt5011CUnu1Ft61b+f2H1gqV/E7vJKIyp2dW3j/BSoyyyYyyyq9yyy1:iD/Xzvf2pErJKZp203j/BSoyyyYyyyC2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-27_18072b3de7b47ed0e58af19b6ed0db57_icedid
Files
-
2024-03-27_18072b3de7b47ed0e58af19b6ed0db57_icedid.exe windows:4 windows x86 arch:x86
1533beb120b9ee068c144edb853bd07d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
timeGetTime
kernel32
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
FindResourceExA
WritePrivateProfileStringA
GetCurrentDirectoryA
SetErrorMode
RtlUnwind
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapReAlloc
ExitThread
CreateThread
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
GlobalReAlloc
GetStringTypeW
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetStdHandle
SetConsoleCtrlHandler
IsBadReadPtr
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEnvironmentVariableA
GetLocaleInfoW
GlobalFlags
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
ReleaseMutex
CreateMutexA
GetFullPathNameA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
MoveFileA
CreateEventA
SuspendThread
SetThreadPriority
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
InterlockedDecrement
VirtualProtect
MulDiv
GlobalAlloc
GetCurrentThreadId
GlobalGetAtomNameA
GlobalMemoryStatus
FlushConsoleInputBuffer
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpynA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetSystemTime
ExpandEnvironmentStringsA
GetStdHandle
GetFileType
WaitForMultipleObjects
PeekNamedPipe
GetTickCount
GetExitCodeThread
SetLastError
SleepEx
QueryDosDeviceA
DefineDosDeviceA
GetVolumeInformationA
GetDiskFreeSpaceA
DeviceIoControl
FormatMessageA
LocalAlloc
GetSystemDirectoryA
GetProcessHeap
HeapAlloc
ExitProcess
HeapFree
FindFirstFileA
FindClose
DeleteFileA
CreateDirectoryA
CreateFileA
Sleep
GetFileInformationByHandle
GetFileAttributesA
SetFileAttributesA
LocalFree
WriteFile
GetDriveTypeA
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
EnterCriticalSection
ReadFile
LeaveCriticalSection
GetFileSize
RemoveDirectoryA
SetEvent
LoadLibraryA
GetProcAddress
GetStartupInfoA
GetCurrentProcess
CreateProcessA
ReadProcessMemory
WriteProcessMemory
ResumeThread
TerminateProcess
OpenProcess
WaitForSingleObject
CloseHandle
FreeLibrary
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
MultiByteToWideChar
GetModuleHandleA
WideCharToMultiByte
GetWindowsDirectoryA
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetStringTypeA
user32
DestroyMenu
LoadCursorA
GetSysColorBrush
MsgWaitForMultipleObjects
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextA
TabbedTextOutA
MapDialogRect
GetAsyncKeyState
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
LoadIconA
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
wsprintfA
WaitForInputIdle
EnumWindows
GetWindowThreadProcessId
LoadBitmapA
UnregisterClassA
CharUpperA
SendMessageA
PostMessageA
GetParent
MessageBoxA
EnableWindow
CallNextHookEx
DrawTextExA
gdi32
CreateCompatibleBitmap
Escape
ExtTextOutA
TextOutA
RectVisible
GetBitmapBits
EnumFontFamiliesExA
GetStockObject
CreateCompatibleDC
SelectObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetTextColor
SetBkColor
PtVisible
BitBlt
SetMapMode
RestoreDC
SaveDC
CreateDCA
GetDeviceCaps
CreateBitmap
GetObjectA
CreateFontA
DeleteObject
GetClipBox
SetViewportOrgEx
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
AllocateAndInitializeSid
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegEnumKeyExA
RegOpenKeyA
RegDeleteKeyA
FreeSid
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
shell32
ShellExecuteA
comctl32
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
GetErrorInfo
SysFreeString
VariantInit
VariantCopy
VariantClear
SysAllocStringByteLen
SysStringByteLen
SafeArrayGetVartype
SafeArrayCopy
SysAllocStringLen
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
VariantChangeType
ws2_32
getsockopt
listen
gethostbyaddr
accept
inet_ntoa
WSASetLastError
gethostbyname
WSAGetLastError
socket
connect
setsockopt
shutdown
WSACleanup
WSAStartup
send
recv
select
ntohs
htons
closesocket
__WSAFDIsSet
ioctlsocket
getsockname
bind
inet_addr
imagehlp
MapAndLoad
UnMapAndLoad
Sections
.text Size: 992KB - Virtual size: 991KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 232KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 220KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE