Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_5bad6680ca28bbfe6dbaebeff1fe5c60_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_5bad6680ca28bbfe6dbaebeff1fe5c60_icedid.exe
Resource
win10v2004-20240412-en
Target
2024-04-17_5bad6680ca28bbfe6dbaebeff1fe5c60_icedid
Size
10.0MB
MD5
5bad6680ca28bbfe6dbaebeff1fe5c60
SHA1
a528c019eb3e11669264a36c2a1d2dc16a9d591b
SHA256
7148ef60262a208d8c62c0b6debd7e902802814256ef48d4ffe336392c4afc61
SHA512
405d17eb1e3d538b432848938705b91412cf1c5f1f3132f810b3701f768e7427328ee67bdbc6d491005163e3cb47e68ca80e1869a2424661bcb30e64a4668e82
SSDEEP
196608:s1nmFVVOvNicmxhTkA7SSdIkxZZqTRIiHxVK3GUID7QrNuIW7z:YnQVINbmxhTkyvfZvYjK3GtM5Wz
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
d:\EPSON_VSS\Quick Wireless\1.31\QW_Installer\UD_Installer\Web_Installer\Release\Web_Installer.pdb
SetupIterateCabinetA
GetFileTime
GetCPInfo
GetOEMCP
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
FileTimeToLocalFileTime
SetErrorMode
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GlobalFlags
WritePrivateProfileStringA
FileTimeToSystemTime
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
ConvertDefaultLocale
EnumResourceLanguagesA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
CreateMutexA
GetTempPathA
GetModuleFileNameA
FindResourceA
LoadResource
SizeofResource
LockResource
WaitForSingleObject
lstrcatA
CreateDirectoryA
GetFileAttributesA
CloseHandle
LoadLibraryA
GetProcAddress
GetProcessHeap
HeapAlloc
FreeLibrary
HeapFree
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
lstrcpyA
GetSystemTimeAsFileTime
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetWindowPos
RegisterWindowMessageA
SetWindowLongA
GetDlgItem
CharUpperA
GetSubMenu
GetMenuItemCount
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
SetWindowTextA
GetClassNameA
GetWindowTextA
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
wsprintfA
GetSystemMetrics
SetMenuItemBitmaps
DestroyMenu
GetFocus
ModifyMenuA
GetMenuItemID
GetMenuState
PostQuitMessage
PostMessageA
SetCursor
SendMessageA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
MessageBoxA
ValidateRect
GetCursorPos
PeekMessageA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
ShowWindow
Escape
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
DeleteObject
SaveDC
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
GetDeviceCaps
CreateBitmap
SelectObject
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
AddAce
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
AllocateAndInitializeSid
GetFileSecurityA
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
RegCloseKey
GetAce
EqualSid
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
FreeSid
RegOpenKeyExA
InitializeSecurityDescriptor
RegSetKeySecurity
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
ShellExecuteExA
ord17
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
VariantClear
VariantChangeType
VariantInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ