e:\Work\Project\xsystem\release\xlauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_2d404434aaf43cc3281f4eaacf555fd1_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_2d404434aaf43cc3281f4eaacf555fd1_icedid.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-20_2d404434aaf43cc3281f4eaacf555fd1_icedid
-
Size
524KB
-
MD5
2d404434aaf43cc3281f4eaacf555fd1
-
SHA1
2ad1cc1c20054537c9b3c32dd3f5118336f1bb08
-
SHA256
373a7276669ac1dddf379aa4ad5b8cd02b7482ac15d37f0f957a31bc14c9e680
-
SHA512
5f3eefccd1d5c648f4b7403859ba282eb7078de847cd13fffb7da5da0048d0e4fba44c67f6e6a6c58678cdd29478bc826f0c7d845c4094dc549b072c6b430494
-
SSDEEP
6144:o2M9WFe9Ua7p7pKQ5IUw+qlHGK6kb/DUP/3ZnQ/bbdGrvE/1V/+aA2AlEPP:mK2qlHG1kCZnQ/srvE/79A2AlEPP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-20_2d404434aaf43cc3281f4eaacf555fd1_icedid
Files
-
2024-04-20_2d404434aaf43cc3281f4eaacf555fd1_icedid.exe windows:4 windows x86 arch:x86
21b00f69a87e2bae22a1867584bd76fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
xengine
??_VXClassBase@@SAXPAX@Z
??0XInstance@@QAE@PBDH@Z
?g_dPerformanceFreq@@3NA
?XMD5BlockCheckSumFile@@YAHPB_WPA_WIP6AHHH0PAX@Z2@Z
?TransportFile@XFileMgr@@QAEHABVXString@@0IIP6AHHHPB_WPAX@Z2@Z
?OpenCompressFile@XFileMgr@@QBEPAVXFile@@ABVXString@@W4XFILE_OPEN_TYPE@@PBDH@Z
?GetFileSize@XFileMgr@@QBEIABVXString@@@Z
??3XClassBase@@SAXPAX@Z
??1XInstance@@UAE@XZ
?XHeapFree@@YAXPAX@Z
??_7XClassBase@@6B@
??1XClassBase@@UAE@XZ
?DebugCheck@XInstance@@UAEHXZ
?CreateMutexGroup@XMain@@QAEIABUXMUTEX_GROUP_DESC@@@Z
?g_xmain@@3VXMain@@A
??0XXMLFile@@QAE@PBDH@Z
??1XXMLFile@@UAE@XZ
?Load@XXMLFile@@QAEHABVXString@@@Z
?BeginNodeRead@XXMLFile@@QAEHAAVXString@@@Z
?ReadAttr@XXMLFile@@QAEHAAVXString@@0@Z
?EndNodeRead@XXMLFile@@QAEHAAVXString@@@Z
?IsFileExist@XFileMgr@@QBEHABVXString@@@Z
?XHeapAlloc@@YAPAXI@Z
?OpenFile@XFileMgr@@QBEPAVXFile@@ABVXString@@W4XFILE_OPEN_TYPE@@PBDH@Z
?CloseFile@XFileMgr@@QBEHPAVXFile@@@Z
?BeginNodeWrite@XXMLFile@@QAEHABVXString@@@Z
?WriteAttr@XXMLFile@@QAEHABVXString@@0@Z
?EndNodeWrite@XXMLFile@@QAEHABVXString@@@Z
?Save@XXMLFile@@QAEHABVXString@@H@Z
?InitializeEngine@XMain@@QAEHPAUHWND__@@IPB_W@Z
?SetFileOpenPriority@XFileMgr@@QAEHW4XFILE_OPEN_PRIORITY@@@Z
?SearchFile@XFileMgr@@QAEHABVXString@@0HAAV?$XArray@VXString@@@@@Z
?SetFileReadOnly@XFileMgr@@QBEHABVXString@@H@Z
?CreateDirectoryOverlapped@XFileMgr@@QAEHABVXString@@@Z
?ReleaseEngine@XMain@@QAEHXZ
?OpenFTPFile@XFileMgr@@QBEPAVXFile@@ABVXString@@W4XFILE_OPEN_TYPE@@PBDH@Z
?IsFileMatch@XFileMgr@@QAEHABVXString@@0IP6AHHHPB_WPAX@Z@Z
?XGetMemorySizeString@@YAXIPA_W@Z
?XGetCurrentThreadType@@YA?AW4XTHREAD_TYPE@@XZ
?WriteFileDirect@XFileMgr@@QBEHABVXString@@PBXI@Z
kernel32
lstrcmpA
EnumResourceLanguagesW
GetVersion
ConvertDefaultLocale
GetCurrentThread
WritePrivateProfileStringW
InterlockedDecrement
GetModuleHandleA
GetVersionExW
GlobalFlags
lstrlenA
GetThreadLocale
FileTimeToSystemTime
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetLocaleInfoW
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
FindClose
FindFirstFileW
GetVolumeInformationW
GetFullPathNameW
CreateFileW
SetErrorMode
GetTickCount
FileTimeToLocalFileTime
GetFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapReAlloc
RaiseException
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
GetTimeZoneInformation
SetStdHandle
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
CompareStringA
InterlockedExchange
GlobalAlloc
FormatMessageW
LocalFree
MulDiv
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
FreeLibrary
CompareStringW
LoadLibraryA
SetLastError
lstrcmpW
GetModuleHandleW
GetProcAddress
GetVersionExA
lstrlenW
MultiByteToWideChar
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
QueryPerformanceCounter
GetLastError
MoveFileExW
DeleteFileW
GetFileAttributesW
CopyFileW
WideCharToMultiByte
Sleep
OpenProcess
GetCurrentProcessId
GetWindowsDirectoryW
GetModuleFileNameW
VirtualQuery
CreateProcessW
CloseHandle
CreateThread
GetUserDefaultLangID
FindResourceW
LoadResource
LockResource
SizeofResource
GetCurrentProcess
TerminateProcess
ExitProcess
user32
GetMenuState
CheckMenuItem
EnableMenuItem
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
MapDialogRect
SetWindowContextHelpId
ValidateRect
GetCursorPos
GetMessageW
SetCursor
GetWindowThreadProcessId
DestroyMenu
TabbedTextOutW
DrawTextW
DrawTextExW
GrayStringW
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
GetSysColorBrush
LoadCursorW
SetCapture
ReleaseCapture
CharNextW
CopyAcceleratorTableW
IsRectEmpty
SetRect
InvalidateRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
CharUpperW
UnregisterClassW
RegisterClipboardFormatW
PostThreadMessageW
GetPropW
RemovePropW
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
UnregisterClassA
GetKeyState
SetForegroundWindow
UpdateWindow
GetMenu
PostMessageW
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
DefWindowProcW
CallWindowProcW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
GetFocus
SetWindowPos
SetFocus
ShowWindow
MoveWindow
SetWindowLongW
GetDlgCtrlID
SetWindowTextW
SendDlgItemMessageW
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
DispatchMessageW
TranslateMessage
PeekMessageW
MessageBoxW
IsWindowVisible
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
PostQuitMessage
AppendMenuW
GetSystemMenu
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
IsChild
LoadIconW
EnableWindow
SendMessageW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
MapWindowPoints
SetPropW
IsDialogMessageW
gdi32
SetTextColor
SetBkColor
GetObjectW
GetDeviceCaps
CreateBitmap
ExtTextOutW
SaveDC
RestoreDC
GetClipBox
SetMapMode
DeleteObject
TextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
PtVisible
ExtSelectClipRgn
DeleteDC
GetStockObject
CreateRectRgnIndirect
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
GetWindowExtEx
GetViewportExtEx
RectVisible
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegQueryValueW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyW
RegCloseKey
RegEnumKeyW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
PathIsUNCW
oledlg
OleUIBusyW
ole32
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CoTaskMemAlloc
CoTaskMemFree
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromProgID
oleaut32
OleCreateFontIndirect
SysAllocString
SystemTimeToVariantTime
SysStringLen
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
psapi
EnumProcessModules
EnumProcesses
GetModuleFileNameExW
dbghelp
SymGetModuleBase64
SymInitialize
SymCleanup
SymEnumerateModules64
Sections
.text Size: 280KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ