D:\Ali\Internal Projects\Protection\Builder\Release\StartExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_8b835f8600ec9fffbafae6fc19fa765d_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-11_8b835f8600ec9fffbafae6fc19fa765d_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-11_8b835f8600ec9fffbafae6fc19fa765d_icedid
-
Size
1.2MB
-
MD5
8b835f8600ec9fffbafae6fc19fa765d
-
SHA1
d4ae8c9b7156f9c9c5276784b0d2178b19ff6124
-
SHA256
a1f3a742aab25f2be6b5eee6959993b4c6b57da20335381039148fac803e10d3
-
SHA512
7c25579c3786120540ba2de75201d228b3cef1310a11a4991b1584136932fed24d35651c2bcd5df2d76be12ab3eb80787490cfefb7754ce950d6c3db374229f8
-
SSDEEP
12288:nxgUVTCEiK6RY8j7QG4BRWDwtqs0w8dutS0wN1UDvryxPb:nxBV2EiLY8jL4BMv1dutSl3s+5b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-11_8b835f8600ec9fffbafae6fc19fa765d_icedid
Files
-
2024-04-11_8b835f8600ec9fffbafae6fc19fa765d_icedid.exe windows:4 windows x86 arch:x86
9c673a96f0e44dec4489cf552aa279dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
kernel32
GetModuleFileNameA
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
GetDriveTypeA
SetUnhandledExceptionFilter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetCurrentProcessId
QueryPerformanceCounter
HeapSize
TerminateProcess
HeapReAlloc
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
GetTickCount
GetCurrentDirectoryA
GetFileTime
GetFileAttributesA
SetErrorMode
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
CreateFileA
GetFullPathNameA
FindFirstFileA
FindClose
lstrcpyA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalAlloc
LocalFree
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
MulDiv
GetModuleHandleA
GetProcAddress
SetLastError
InterlockedDecrement
GlobalLock
GlobalUnlock
GlobalFree
GetVolumeInformationA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
DeleteFileA
CloseHandle
SetFileAttributesA
GetSystemTime
WaitForSingleObject
ResumeThread
WriteProcessMemory
ReadProcessMemory
OpenProcess
FormatMessageA
GetLastError
CreateProcessA
GetCommandLineA
SetEnvironmentVariableA
FreeResource
MultiByteToWideChar
GetVersion
lstrcmpiA
lstrlenA
CompareStringA
CompareStringW
user32
GrayStringA
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
GetSysColor
GetWindow
PtInRect
CopyRect
GetTopWindow
GetMessageTime
GetMessagePos
ClientToScreen
PeekMessageA
DispatchMessageA
GetLastActivePopup
GetForegroundWindow
MapWindowPoints
GetWindowTextLengthA
IsChild
SetFocus
GetFocus
SendDlgItemMessageA
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassInfoExA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetCapture
WinHelpA
RegisterWindowMessageA
IsDialogMessageA
SetWindowTextA
MoveWindow
ShowWindow
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
MessageBoxA
GetKeyState
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
CharUpperA
LoadBitmapA
DrawIcon
GetClientRect
EnableWindow
LoadIconA
FillRect
GetSysColorBrush
SetTimer
SendMessageA
IsIconic
GetSystemMetrics
GetWindowRect
KillTimer
GetWindowTextA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
UnregisterClassA
RegisterClassA
GetClassInfoA
EqualRect
AdjustWindowRectEx
GetMenuItemCount
GetMenuItemID
GetSubMenu
PostMessageA
GetMenu
UpdateWindow
IsWindowVisible
SetForegroundWindow
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
SetCapture
DestroyMenu
LoadCursorA
SetWindowContextHelpId
MapDialogRect
SetCursor
PostQuitMessage
wsprintfA
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
gdi32
GetRgnBox
GetTextColor
GetBkColor
GetMapMode
CreateRectRgnIndirect
GetDeviceCaps
GetStockObject
CreateBitmap
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
BitBlt
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
shell32
SHFileOperationA
comctl32
ord17
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
oledlg
ord8
ole32
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StgOpenStorageOnILockBytes
CoTaskMemFree
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
OleCreateFontIndirect
SysAllocString
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringLen
SysFreeString
imagehlp
MapAndLoad
UnMapAndLoad
Sections
.text Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ