f:\驱动人生6\DTL6\trunk\dtl_crash_report\project\DtlCrashReport\Release\DtlCrashReport.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_5211dba6626953a08cd66463d307a561_icedid.exe
Resource
win7-20240215-en
General
-
Target
2024-04-16_5211dba6626953a08cd66463d307a561_icedid
-
Size
4.6MB
-
MD5
5211dba6626953a08cd66463d307a561
-
SHA1
ff622f1eaadff2ab47ca67830dd3713587b370cd
-
SHA256
458471958dc4617b662b9f52312ecdd7f1ca67cba749295f6be05a6148a56a03
-
SHA512
3181863351bf5c4934014a019ee272e3f8ed0d3fbc09473705084aac7fa6c4194a8eea358e954a9587b32e6ee38693967c90750bebf2c6d7a12cbf4014d882c5
-
SSDEEP
6144:F7/VkcELVH798KlBGpHpvSh+owLtcV6DxjdcTnGeoop/I0WHOTux:F7dOVHBavSh+v5cV6D1dcTGo6zO8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-16_5211dba6626953a08cd66463d307a561_icedid
Files
-
2024-04-16_5211dba6626953a08cd66463d307a561_icedid.exe windows:5 windows x86 arch:x86
750199ecd09264d26a07a44f38204f8f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalFindAtomW
lstrlenA
SetErrorMode
GetFileAttributesW
GetFileSizeEx
GetFileTime
UnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
RtlUnwind
ExitProcess
HeapReAlloc
RaiseException
HeapSize
SetStdHandle
GetFileType
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
LoadLibraryA
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCPInfo
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetVersionExA
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
CompareStringW
GlobalFlags
GetModuleHandleA
WritePrivateProfileStringW
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
LocalFree
lstrlenW
GlobalAddAtomW
InterlockedDecrement
SetLastError
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetVersionExW
GetCurrentProcess
ReadFile
PeekNamedPipe
GetStartupInfoW
CreatePipe
CreateProcessW
WaitForSingleObject
TerminateProcess
Process32NextW
GetCurrentProcessId
Process32FirstW
CreateToolhelp32Snapshot
GetModuleHandleW
FormatMessageA
WriteFile
GetLocalTime
CloseHandle
GetFileSize
DeleteFileA
GetModuleFileNameA
SetFilePointer
LeaveCriticalSection
CreateFileA
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindResourceW
LoadResource
LockResource
SizeofResource
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
GetSystemTimeAsFileTime
Sleep
FormatMessageW
GetLastError
GetACP
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleFileNameW
user32
DestroyMenu
GetSysColorBrush
ShowWindow
RegisterWindowMessageW
LoadIconW
WinHelpW
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
CallWindowProcW
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
UnregisterClassW
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
GetWindowTextW
SetWindowTextW
GetSysColor
ReleaseDC
GetDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
LoadCursorW
GetCapture
ClientToScreen
CharUpperW
GetSystemMetrics
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
SendMessageW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
PostQuitMessage
PostMessageW
DefWindowProcW
gdi32
TextOutW
GetStockObject
RectVisible
PtVisible
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
CreateBitmap
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ExtTextOutW
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathStripToRootW
PathIsUNCW
PathFileExistsW
PathRemoveFileSpecA
UrlUnescapeW
oleaut32
VariantClear
VariantChangeType
VariantInit
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
HttpSendRequestW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetGetLastResponseInfoW
InternetCloseHandle
InternetConnectW
HttpOpenRequestW
InternetOpenW
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetSetOptionExW
InternetQueryDataAvailable
Sections
.text Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE