g:\acro_root_at\acrobat\installers\bootstrapexe_small\release\Setup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-05_e4a8194268f6540293e2caf54ad24ab2_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-05_e4a8194268f6540293e2caf54ad24ab2_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-05_e4a8194268f6540293e2caf54ad24ab2_icedid
-
Size
2.8MB
-
MD5
e4a8194268f6540293e2caf54ad24ab2
-
SHA1
216265cbdc7545b63af1f1105b0d2235f8385f49
-
SHA256
64e7dcf27c4790d14e02e5c5ee9ea3eef2ec73def7f31c33ac83a0efcebbcc61
-
SHA512
1400a05be81efb6b45cbd5952b25875008843fb1f6bceff058f48faca0b2c6ddf4a3dcaadf93a76127bb63ab1c207080443ba7e455242b2ec9c065e1be92c6b2
-
SSDEEP
49152:gx8xmN3Aek03noj45wlDTfDkYOMwwnMb4PmyVBBMO+YrovpU/9L:gxeUJF3noxDsYOXwnS4rVcOgy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-05_e4a8194268f6540293e2caf54ad24ab2_icedid
Files
-
2024-04-05_e4a8194268f6540293e2caf54ad24ab2_icedid.exe windows:4 windows x86 arch:x86
bbb582bf7795973e953df5dc67ac275c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msi
ord118
ord160
ord32
ord159
ord92
ord19
ord195
ord8
ord205
kernel32
lstrlenA
GetModuleHandleA
GlobalFlags
WritePrivateProfileStringW
GetFileAttributesW
GetFileTime
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
HeapReAlloc
ExitThread
CreateThread
ExitProcess
SetStdHandle
GetFileType
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
TlsFree
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
VirtualAlloc
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
GetDriveTypeA
CreateFileA
SetEnvironmentVariableA
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
InterlockedIncrement
CreateFileW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
CreateEventW
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetCurrentProcessId
GetModuleFileNameW
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
FreeLibrary
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
FreeResource
WideCharToMultiByte
MultiByteToWideChar
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenW
MulDiv
GetCurrentDirectoryW
SetCurrentDirectoryW
GetVersionExW
ExpandEnvironmentStringsW
GetPrivateProfileStringW
GetModuleHandleW
GetProcAddress
GetCurrentProcess
GetSystemInfo
GetTempPathW
CreateProcessW
GetLastError
WaitForSingleObject
GetExitCodeProcess
CloseHandle
FormatMessageW
LocalFree
GetUserDefaultLangID
FindResourceW
LoadResource
LockResource
SizeofResource
GetEnvironmentStringsW
user32
UnregisterClassW
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
LoadCursorW
GetDC
ReleaseDC
GetSysColorBrush
CharUpperW
SetCursor
PostQuitMessage
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
GetWindowThreadProcessId
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageA
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
UnregisterClassA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetMenu
MessageBoxW
CreateWindowExW
GetClassInfoExW
RegisterClassW
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamW
DestroyWindow
GetNextDlgTabItem
EndDialog
GetWindowTextW
GetFocus
GetParent
SetWindowPos
SetFocus
IsWindowEnabled
ShowWindow
SetWindowLongW
GetDlgCtrlID
IsWindow
SetWindowTextW
GetWindowLongW
IsDialogMessageW
DestroyMenu
EndPaint
GetTopWindow
BeginPaint
SendDlgItemMessageW
GetDlgItem
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostMessageW
EnableWindow
KillTimer
SetTimer
SendMessageW
GetClassInfoW
PeekMessageW
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
SaveDC
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
DeleteObject
SetMapMode
RestoreDC
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
InitiateSystemShutdownW
shell32
SHGetSpecialFolderPathW
shlwapi
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
StrFormatByteSizeW
PathIsUNCW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
VariantInit
VariantChangeType
VariantClear
urlmon
URLDownloadToFileW
Sections
.text Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ