f:\驱动人生6\DTL6\trunk\dtl_crash_report\project\DtlCrashReport\Release\DtlCrashReport.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_cb066ed07a6f17ac89258ec2ed4e63ee_icedid.exe
Resource
win7-20240221-en
General
-
Target
2024-04-16_cb066ed07a6f17ac89258ec2ed4e63ee_icedid
-
Size
4.6MB
-
MD5
cb066ed07a6f17ac89258ec2ed4e63ee
-
SHA1
2c701ad1d6b55a066e03870b91a9c95b82c487ab
-
SHA256
ae86514a4b44701e3edea4edf616d2c110aa6bb55ae2bd44b91705f8343bd6a5
-
SHA512
6118f988798e307643eb3465ab79543a1d199adaf36bd60b351843ed4f33298434cea50899bae04a0133c618793b9b44497d34af32916f07e12257959e3c0943
-
SSDEEP
6144:L7/VkcELVH798KlBGpHpvShWowLtcV6DxjdcTnGe+xhWQUMKtS62gWS:L7dOVHBavShWv5cV6D1dcTdQmSxg3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-16_cb066ed07a6f17ac89258ec2ed4e63ee_icedid
Files
-
2024-04-16_cb066ed07a6f17ac89258ec2ed4e63ee_icedid.exe windows:5 windows x86 arch:x86
750199ecd09264d26a07a44f38204f8f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalFindAtomW
lstrlenA
SetErrorMode
GetFileAttributesW
GetFileSizeEx
GetFileTime
UnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
RtlUnwind
ExitProcess
HeapReAlloc
RaiseException
HeapSize
SetStdHandle
GetFileType
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
LoadLibraryA
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCPInfo
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetVersionExA
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
CompareStringW
GlobalFlags
GetModuleHandleA
WritePrivateProfileStringW
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateFileW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
LocalFree
lstrlenW
GlobalAddAtomW
InterlockedDecrement
SetLastError
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetVersionExW
GetCurrentProcess
ReadFile
PeekNamedPipe
GetStartupInfoW
CreatePipe
CreateProcessW
WaitForSingleObject
TerminateProcess
Process32NextW
GetCurrentProcessId
Process32FirstW
CreateToolhelp32Snapshot
GetModuleHandleW
FormatMessageA
WriteFile
GetLocalTime
CloseHandle
GetFileSize
DeleteFileA
GetModuleFileNameA
SetFilePointer
LeaveCriticalSection
CreateFileA
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindResourceW
LoadResource
LockResource
SizeofResource
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
GetSystemTimeAsFileTime
Sleep
FormatMessageW
GetLastError
GetACP
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleFileNameW
user32
DestroyMenu
GetSysColorBrush
ShowWindow
RegisterWindowMessageW
LoadIconW
WinHelpW
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
CallWindowProcW
GetMenu
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
UnregisterClassW
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
GetWindowTextW
SetWindowTextW
GetSysColor
ReleaseDC
GetDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
LoadCursorW
GetCapture
ClientToScreen
CharUpperW
GetSystemMetrics
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
SendMessageW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
PostQuitMessage
PostMessageW
DefWindowProcW
gdi32
TextOutW
GetStockObject
RectVisible
PtVisible
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
CreateBitmap
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ExtTextOutW
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shlwapi
PathFindExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathStripToRootW
PathIsUNCW
PathFileExistsW
PathRemoveFileSpecA
UrlUnescapeW
oleaut32
VariantClear
VariantChangeType
VariantInit
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
HttpSendRequestW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetGetLastResponseInfoW
InternetCloseHandle
InternetConnectW
HttpOpenRequestW
InternetOpenW
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetSetOptionExW
InternetQueryDataAvailable
Sections
.text Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE