e:\slave\workspace\7180-branches-deploy\bin\Release\ClientIME\ClientIME.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-02_2028bd97dae570bebc86836dd000dbf0_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-02_2028bd97dae570bebc86836dd000dbf0_icedid.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-02_2028bd97dae570bebc86836dd000dbf0_icedid
-
Size
1.3MB
-
MD5
2028bd97dae570bebc86836dd000dbf0
-
SHA1
4fbd771d0b4f94a904bfa20182c7403ff11ee09a
-
SHA256
e2e8c9263be237e57e2a4cd028696b20199e1751db15c2814f87a17a690ac41d
-
SHA512
143d0896d10e6fdfbf1f12fc3f0712bbec5d8b5e9573b1a9c28316bc3fdc52c753c588e358bc93d880277ce4c331469018fea622a45cc9556eb731e40fa17d87
-
SSDEEP
24576:+rFC45nSNbCfY0j2lNUNG9SCDT2wsYl9XNpY2zOJBOJB:+rFDFSd70j2lNUNGYQ9XQ2zWBWB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-02_2028bd97dae570bebc86836dd000dbf0_icedid
Files
-
2024-05-02_2028bd97dae570bebc86836dd000dbf0_icedid.exe windows:5 windows x86 arch:x86
d77d7871d6f623d71aa86f3da39d6819
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetErrorMode
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
HeapSize
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetCurrentDirectoryA
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetOEMCP
GetModuleHandleW
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
TlsGetValue
LocalAlloc
GlobalFlags
GetFileTime
GetFileSizeEx
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetThreadLocale
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
FormatMessageA
LocalFree
GetCurrentProcessId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
lstrcpynA
GetWindowsDirectoryA
GetVersion
GetFileAttributesA
CopyFileA
EnumResourceNamesA
FreeLibrary
CreateDirectoryA
CreateFileA
GetFileSize
ReadFile
GlobalReAlloc
GlobalFree
GetModuleHandleA
LoadLibraryA
GetProcAddress
SetLastError
MulDiv
FreeResource
GlobalAlloc
GlobalLock
GlobalUnlock
GetPrivateProfileIntA
CreateThread
TerminateThread
Sleep
GetTickCount
GetLocalTime
GetCurrentThreadId
OutputDebugStringA
SetEvent
UnmapViewOfFile
OpenFileMappingA
OpenEventA
CreateFileMappingA
CreateEventA
MapViewOfFile
MultiByteToWideChar
GetVersionExA
GetTimeZoneInformation
SetSystemTime
FindFirstFileA
SetFileAttributesA
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
OpenProcess
GetPrivateProfileSectionNamesA
WritePrivateProfileStructA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrlenA
OpenThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateProcessA
WaitForSingleObject
CloseHandle
GetModuleFileNameA
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
CreateMutexA
GetLastError
ReleaseMutex
GetCurrentProcess
GetConsoleMode
TerminateProcess
user32
UnregisterClassA
MessageBeep
GetNextDlgGroupItem
IsRectEmpty
CopyAcceleratorTableA
CharNextA
GetSysColorBrush
WindowFromPoint
CharUpperA
DestroyMenu
SetWindowContextHelpId
MapDialogRect
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetActiveWindow
ValidateRect
PostQuitMessage
GetMenuStringA
GetWindowThreadProcessId
EndPaint
BeginPaint
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetDlgItem
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetMenu
GetScrollRange
GetScrollPos
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
GetScrollInfo
SetScrollInfo
GetDlgCtrlID
DefWindowProcA
GetMenu
IntersectRect
GetWindowPlacement
GetWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
CheckMenuItem
CallWindowProcA
ClientToScreen
SetWindowPos
SystemParametersInfoA
GetSysColor
GetDC
GetDesktopWindow
DrawIconEx
DestroyIcon
SetForegroundWindow
IsWindow
IsZoomed
GetKeyState
FrameRect
EnumChildWindows
GetClassNameA
GetWindowDC
InflateRect
GetWindowRgn
ScreenToClient
GetCursorPos
TrackMouseEvent
IsWindowVisible
ModifyMenuA
GetSubMenu
GetMenuItemInfoA
GetMenuState
GetMenuItemID
PostThreadMessageA
RegisterClipboardFormatA
GetTopWindow
GetClientRect
EnableWindow
PostMessageA
FindWindowA
SetWindowLongA
GetWindowLongA
GetSystemMetrics
PtInRect
DrawIcon
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
GetWindowRect
UpdateWindow
InvalidateRect
LoadIconA
ReleaseDC
GetTitleBarInfo
wsprintfA
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
ReleaseCapture
OffsetRect
SetCapture
SetRect
FillRect
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
SetWindowRgn
GetParent
SetCursor
LoadCursorA
DestroyCursor
GetMenuItemCount
EnableMenuItem
LoadBitmapA
CopyRect
CopyImage
RegisterWindowMessageA
GetFocus
KillTimer
SetTimer
InvalidateRgn
gdi32
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetStockObject
GetMapMode
GetBkColor
GetTextColor
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
CreateCompatibleBitmap
ExcludeClipRect
SetMapMode
SetStretchBltMode
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
SelectClipRgn
GetCurrentObject
CreateEllipticRgn
StretchBlt
RealizePalette
CreateBitmap
CreateICA
GetDIBits
SelectPalette
Rectangle
CreateSolidBrush
CreatePen
PtInRegion
CreateDIBSection
ExtCreateRegion
DeleteDC
CreateRectRgnIndirect
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetRgnBox
OffsetRgn
CombineRgn
CreateRectRgn
CreatePatternBrush
DeleteObject
CreateFontA
BitBlt
SelectObject
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueA
RegCloseKey
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
shell32
SHBrowseForFolderA
SHGetMalloc
SHAppBarMessage
ExtractIconExA
SHGetPathFromIDListA
comctl32
FlatSB_EnableScrollBar
ord17
InitializeFlatSB
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
PathRemoveFileSpecW
oledlg
ord8
ole32
OleUninitialize
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoUninitialize
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CreateStreamOnHGlobal
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantCopy
VariantClear
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
OleLoadPicture
ws2_32
ntohl
inet_ntoa
gethostbyname
gethostname
inet_addr
htonl
psapi
GetModuleBaseNameA
EnumProcesses
EnumProcessModules
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
gdiplus
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipDisposeImage
GdipCloneImage
GdipFree
GdipAlloc
netapi32
Netbios
iphlpapi
GetAdaptersInfo
rpcrt4
UuidCreate
Sections
.text Size: 599KB - Virtual size: 598KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 583KB - Virtual size: 582KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ