Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_63992485cc65d68c1729a18829ce3471_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_63992485cc65d68c1729a18829ce3471_icedid.exe
Resource
win10v2004-20240226-en
Target
2024-04-10_63992485cc65d68c1729a18829ce3471_icedid
Size
1.1MB
MD5
63992485cc65d68c1729a18829ce3471
SHA1
73537e7d050018a08bbce0f83476f7b0ab7066dd
SHA256
4fa73e7a589ef1931e9508752188c2b46d0693e6c7d47b693e0aba838882440e
SHA512
396ce1ddd08b6eb2bc628525d7e294ad268948b9c4a8d46525e0fa105155e4ece5fe270de29477f04f2546316fc2fce00e08944939d27d770499d8a3efc82b1b
SSDEEP
24576:0TMAm55LXigPiwtROA79SM+85bc8MIPeXMshFXq2s2+6QTXW:6MXLXigPiz85bcJCFMFXqfFTm
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\Project_Launcher\Source\Launcher\NyxLauncher\OutPut\Release\NyxLauncher\NyxLauncher.pdb
LocalReAlloc
TlsFree
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetCurrentDirectoryA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
VirtualQuery
RtlUnwind
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
TerminateProcess
GetStartupInfoA
GetCommandLineA
ExitThread
CreateThread
SetEnvironmentVariableA
HeapReAlloc
HeapSize
TlsSetValue
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
IsBadReadPtr
IsBadCodePtr
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetStdHandle
GetLocaleInfoW
GetProcessHeap
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
LocalAlloc
GetFileTime
SetFileTime
SystemTimeToFileTime
LocalFileTimeToFileTime
GetUserDefaultLCID
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
UnlockFile
LockFile
FlushFileBuffers
lstrcpyA
FileTimeToLocalFileTime
FileTimeToSystemTime
WritePrivateProfileStringA
InterlockedDecrement
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
InterlockedIncrement
FreeResource
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
SetVolumeLabelA
GetDiskFreeSpaceA
GetDriveTypeA
MoveFileA
SetEndOfFile
SetFileAttributesA
SetFilePointer
QueryPerformanceCounter
QueryPerformanceFrequency
CreateDirectoryA
GetFileAttributesA
GetModuleFileNameA
GetFullPathNameA
WaitForMultipleObjects
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObject
CreateEventA
SetEvent
FindResourceExA
CreateProcessA
GetSystemDirectoryA
LoadLibraryA
FreeLibrary
GetFileSize
CopyFileA
CreateMutexA
SetCurrentDirectoryA
ReadFile
ReleaseMutex
ExitProcess
GetCurrentProcessId
Sleep
OutputDebugStringA
GetSystemInfo
GlobalMemoryStatusEx
GlobalMemoryStatus
GetLocalTime
CreateFileA
WriteFile
CloseHandle
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleHandleA
GetProcAddress
MulDiv
GetTickCount
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetSystemTime
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
MessageBoxA
GetKeyState
UpdateWindow
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
GetDlgCtrlID
CallWindowProcA
IntersectRect
GetWindowPlacement
GetWindow
CharNextA
GetActiveWindow
CreateDialogIndirectParamA
IsWindow
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
CharToOemBuffA
OemToCharBuffA
LoadImageA
PostThreadMessageA
SetRectEmpty
wvsprintfA
MoveWindow
SetWindowTextA
LoadCursorA
FrameRect
InflateRect
IsRectEmpty
SetWindowRgn
GetSysColor
SetCapture
ReleaseCapture
SystemParametersInfoA
SetTimer
KillTimer
SetCursor
GetCursorPos
ScreenToClient
PtInRect
OffsetRect
EqualRect
SetActiveWindow
SetWindowPos
OpenIcon
GetDlgItem
ShowWindow
SetFocus
GetDC
GetDesktopWindow
ReleaseDC
ClientToScreen
CharUpperA
MessageBeep
DestroyMenu
InvalidateRgn
CopyAcceleratorTableA
SetRect
GetWindowRect
GetParent
CreateWindowExA
DefWindowProcA
PeekMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
SetForegroundWindow
LoadAcceleratorsA
GetSystemMetrics
GetWindowLongA
SetWindowLongA
LoadIconA
EnableWindow
RedrawWindow
IsWindowVisible
InvalidateRect
GetUpdateRect
GetClientRect
IsIconic
PostMessageA
SendMessageA
DrawIcon
CopyRect
UnregisterClassA
RegisterClipboardFormatA
GetNextDlgGroupItem
wsprintfA
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
GetMessageA
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
GrayStringA
CheckDlgButton
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsDialogMessageA
GetSubMenu
DrawTextExA
SetBkColor
CreateBitmap
SaveDC
RestoreDC
SetBkMode
SetMapMode
GetViewportExtEx
GetWindowExtEx
PtVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetTextColor
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreateRectRgnIndirect
GetMapMode
GetRgnBox
GetClipBox
GetTextColor
GetBkColor
GetDIBits
CreateBrushIndirect
FrameRgn
CreateRoundRectRgn
CreatePolygonRgn
GetStockObject
GetObjectA
RectVisible
SetDIBitsToDevice
StretchDIBits
SelectClipRgn
CreateRectRgn
GetTextExtentPoint32A
CreateCompatibleDC
GetDeviceCaps
CreateDIBSection
SelectObject
DeleteObject
DeleteDC
BitBlt
CreateSolidBrush
CreateFontA
GetFileTitleA
DocumentPropertiesA
OpenPrinterA
ClosePrinter
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
RegDeleteValueA
ShellExecuteA
ord17
PathIsUNCA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
ord8
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoDisconnectObject
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CoTaskMemFree
CoCreateInstance
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
SysFreeString
VariantInit
OleCreateFontIndirect
VariantClear
VariantChangeType
SysStringLen
SysAllocStringByteLen
VariantCopy
SysAllocString
DispCallFunc
LoadRegTypeLi
SystemTimeToVariantTime
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
SafeArrayCreate
LoadTypeLi
SysAllocStringLen
WSASocketA
WSAEventSelect
WSACloseEvent
ntohl
sendto
WSAEnumNetworkEvents
gethostname
ntohs
getservbyport
gethostbyaddr
getservbyname
accept
recv
shutdown
inet_addr
gethostbyname
WSACreateEvent
inet_ntoa
connect
ioctlsocket
WSAAsyncSelect
setsockopt
send
WSACleanup
closesocket
recvfrom
bind
htons
htonl
socket
WSAStartup
WSAGetLastError
DirectDrawCreate
GetAdaptersInfo
InternetSetStatusCallback
HttpQueryInfoA
InternetSetOptionA
InternetOpenUrlA
InternetOpenA
InternetCrackUrlA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetCloseHandle
InternetSetCookieA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ