Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_0c80032cf9851185d7452fa6340cf87d_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_0c80032cf9851185d7452fa6340cf87d_icedid.exe
Resource
win10v2004-20240412-en
Target
2024-04-17_0c80032cf9851185d7452fa6340cf87d_icedid
Size
205KB
MD5
0c80032cf9851185d7452fa6340cf87d
SHA1
31bec7036f48f5cc6fd178464627d343c1aafe80
SHA256
301e3a4154973f29e86d2511bb7347b7b24d0c7d87fd835e2ebcc230edf7c0c3
SHA512
d90b11159c99fa6fc673ad4393b5c48e0bd7b61c3571b753b5c18e6497710e375a8a2c09a42017b8c2ebc2c8fd61c422cbcc1f49847aecefcc1f7ab79f42ca5d
SSDEEP
3072:x5mTUUJg0aujenlx2BqzilKuVYs1SXb587VdUnlIrUwr73TJ3tlRLQIgfxcuh:fVoaujenlx2kzXuV5eb58welRL7uh
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\kayak-b\installer\setuputility\release\Install.pdb
ord160
ord159
ord115
ord8
ord32
ord118
ord113
ord92
HeapFree
HeapAlloc
GetProcessHeap
RtlUnwind
RaiseException
ExitProcess
HeapReAlloc
HeapSize
Sleep
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalFindAtomW
LoadLibraryW
LoadLibraryA
GetVersionExA
GetCurrentProcessId
GlobalAddAtomW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GlobalFlags
GetModuleHandleA
WritePrivateProfileStringW
InterlockedDecrement
InterlockedIncrement
SetErrorMode
SetLastError
GlobalDeleteAtom
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryExW
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
lstrcmpW
FreeLibrary
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
lstrlenW
LocalAlloc
GetCurrentProcess
GetLastError
GetCurrentThread
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
LocalFree
GetUserDefaultLangID
GetNativeSystemInfo
FindResourceW
LoadResource
LockResource
SizeofResource
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetStartupInfoW
SetCurrentDirectoryW
GetModuleHandleW
GetCommandLineW
GetCurrentDirectoryW
FreeConsole
GetEnvironmentStrings
ShowWindow
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
UnregisterClassA
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
GetWindow
GetDlgCtrlID
GetWindowLongW
GetClassNameW
PtInRect
GetWindowTextW
SetWindowTextW
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
GetParent
ModifyMenuW
EnableMenuItem
CheckMenuItem
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
DestroyMenu
SendMessageW
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
UnhookWindowsHookEx
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
PostMessageW
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowRect
DefWindowProcW
DeleteDC
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
DeleteObject
GetClipBox
SetMapMode
SetTextColor
DocumentPropertiesW
ClosePrinter
OpenPrinterW
RegQueryValueW
RegEnumKeyW
RegOpenKeyExW
RegOpenKeyW
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
InitializeSecurityDescriptor
AllocateAndInitializeSid
DuplicateToken
OpenProcessToken
OpenThreadToken
RegQueryValueExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
FreeSid
AccessCheck
IsValidSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegDeleteKeyW
PathFindFileNameW
PathFindExtensionW
VariantClear
VariantInit
VariantChangeType
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ