f:\patchbuild\gsw531\source\Translator\gntxengine\ReleaseDBG\GNTXEng.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_e22e482709d09656c080c5de14105292_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-21_e22e482709d09656c080c5de14105292_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-21_e22e482709d09656c080c5de14105292_icedid
-
Size
2.2MB
-
MD5
e22e482709d09656c080c5de14105292
-
SHA1
6ab826127274cf8c01a95089692ca9dd57f04b3e
-
SHA256
27aa0eece0485f478023e448886c140fa1b32129a700bd533f85ac96d17e6490
-
SHA512
417afeb8d06f7d1b8437ddd69a85ee4a0ade4b61a9e3ae81011f5837b9de65ff73375fb98625349113f9d79d6340c510f01ed6fd1f7969b5ebc0a937b0499169
-
SSDEEP
12288:lb51iVN0sk3Hi1eG7uLj8Iga5SpVcKSrDW2GD/tjQ8J9y+0FatFjrbeI:lb51inUHUaeUDR0/K8J9wFMFjrqI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-21_e22e482709d09656c080c5de14105292_icedid
Files
-
2024-04-21_e22e482709d09656c080c5de14105292_icedid.exe windows:5 windows x86 arch:x86
7f787733aa65ce14580f685b52dac84f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gensec
SafeLoadLibrary
rpcrt4
NdrFreeBuffer
NdrRpcSmClientAllocate
NdrRpcSmClientFree
RpcStringBindingComposeA
RpcBindingFromStringBindingA
RpcStringFreeA
RpcMgmtIsServerListening
NdrConformantArrayBufferSize
NdrConformantArrayMarshall
NdrComplexStructBufferSize
NdrComplexStructMarshall
NdrComplexStructUnmarshall
NdrConformantArrayUnmarshall
NdrSimpleStructBufferSize
NdrSimpleStructMarshall
NdrSimpleStructUnmarshall
RpcRaiseException
NdrClientInitializeNew
NdrConformantStringBufferSize
NdrGetBuffer
NdrConformantStringMarshall
NdrSendReceive
NdrConvert
RpcBindingFree
shlwapi
PathFileExistsA
PathIsUNCA
PathFindFileNameA
PathStripToRootA
kernel32
GetVolumeInformationA
GetFullPathNameA
CreateFileA
FileTimeToLocalFileTime
GetFileAttributesExA
GetFileAttributesA
GetFileSizeEx
GetFileTime
GlobalAddAtomA
GlobalFlags
GetVersionExA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
InterlockedExchange
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
SetCurrentDirectoryA
OpenFile
ReleaseMutex
_lclose
_lcreat
CreateMutexA
CreateDirectoryExA
WinExec
GetACP
IsDBCSLeadByteEx
IsValidCodePage
GetTempFileNameA
GetTempPathA
HeapAlloc
FindFirstFileA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
CreateThread
RtlUnwind
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetTimeZoneInformation
CreateDirectoryA
SetEnvironmentVariableA
VirtualFree
HeapCreate
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
CompareStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetExitCodeProcess
CreateProcessA
HeapFree
lstrcpyA
lstrcpyW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryA
DeleteFileA
FileTimeToSystemTime
lstrcmpA
GlobalGetAtomNameA
CompareStringA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GlobalFree
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
SetLastError
LockResource
GetCommandLineA
GetCurrentThreadId
Sleep
GetModuleHandleA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
IsDBCSLeadByte
GetModuleHandleW
GetProcAddress
GetModuleFileNameA
CreateEventA
SetEvent
lstrcmpiA
lstrlenA
InterlockedDecrement
InterlockedIncrement
WaitForSingleObject
CloseHandle
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
user32
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
SetFocus
GetFocus
GetDesktopWindow
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
SetWindowsHookExA
GetMenu
GetKeyState
PeekMessageA
ValidateRect
CharUpperA
GetWindowTextA
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetClassInfoExA
CallWindowProcA
DefWindowProcA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CopyRect
AdjustWindowRectEx
RegisterClassA
GetClassInfoA
CreateWindowExA
PostMessageA
GetClientRect
SetForegroundWindow
SetMenu
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
wsprintfA
ShowCaret
GetProcessWindowStation
GetUserObjectInformationA
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
PostQuitMessage
RegisterWindowMessageA
LoadIconA
WinHelpA
LoadStringA
GetMessageA
DispatchMessageA
CharNextW
CharNextA
PostThreadMessageA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
CallNextHookEx
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetMapMode
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegQueryValueExA
RegEnumKeyA
RegQueryValueA
RegOpenKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
ole32
CLSIDFromProgID
OleRun
CLSIDFromString
StringFromCLSID
CoGetMalloc
ProgIDFromCLSID
CoInitializeEx
CoUninitialize
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
CoTaskMemRealloc
CoTaskMemAlloc
StringFromIID
IIDFromString
oleaut32
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
SafeArrayCreateVector
VariantInit
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantCopy
VariantChangeType
VariantClear
SafeArrayAccessData
SafeArrayUnaccessData
SysStringByteLen
SetErrorInfo
CreateErrorInfo
GetErrorInfo
odbc32
ord19
ord24
ord72
ord16
ord45
ord39
ord31
ord12
ord5
ord51
ord50
ord44
ord68
ord43
ord59
ord4
ord13
ord18
ord46
ord11
ord49
ord48
ord8
ord14
ord9
ord15
ord23
ord1
ord2
ord3
ord61
ord10
ord41
ord17
ord20
Sections
.text Size: 1002KB - Virtual size: 1002KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.0MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ