C:\Users\lg\Desktop\Src_16May2011\Code\32bit - Code\XP-Vista\SmartDualMon\Release_Unicode\Dual Package.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-04_414e5acc7711043e9f777db38244b6d8_icedid.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-04_414e5acc7711043e9f777db38244b6d8_icedid.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-04_414e5acc7711043e9f777db38244b6d8_icedid
-
Size
689KB
-
MD5
414e5acc7711043e9f777db38244b6d8
-
SHA1
d01cfabc2f98f6f078b4b03daa260f1e4c72e340
-
SHA256
c194bfe7157e93485a356be566d8d15f1e13d28eda78ee850c17be0607478dcd
-
SHA512
7f556825be462af61c18860549da62ca9f331dbae6bd3ac8ab9df255c98e0d7ba8fac78e58cd21127e1329b6eb63991ff26b6d24c17827dba9f970b7be6a83af
-
SSDEEP
12288:97ovuNCE7iNSEawTBUfj+sBYdjNy/NYX+Qp9Fzym:9ovCiNSEGj+sBik++Q5Wm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-04_414e5acc7711043e9f777db38244b6d8_icedid
Files
-
2024-05-04_414e5acc7711043e9f777db38244b6d8_icedid.exe windows:5 windows x86 arch:x86
0fb9474bcb5c0c1f23841f74f9c4a4dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mousehook
UnHook
clearWndMsgHook
clearMsgHook
clearKeyBoardMsgHook
ClearMouseMsgHook
setWndMsgHook
SetMsgHook
SetKeyBoardMsgHook
SetMouseClickHook
Hook
win32utility
?WriteRegKey@CRegUtility@@QAEHPAUHKEY__@@PA_WPB_WHAAUSRegData@@@Z
??1CRegUtility@@UAE@XZ
??0CRegUtility@@QAE@XZ
?ReadRegKey@CRegUtility@@QAEHPAUHKEY__@@PA_WPB_WAAUSRegData@@@Z
psapi
EnumProcessModules
GetModuleBaseNameW
EnumProcesses
kernel32
FindFirstFileW
GetVolumeInformationW
GetFullPathNameW
CreateFileW
FileTimeToLocalFileTime
GetFileAttributesW
GetFileSizeEx
GetFileTime
SetErrorMode
GetTickCount
GetStartupInfoW
HeapAlloc
HeapFree
ExitProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
HeapReAlloc
FindClose
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FileTimeToSystemTime
GetThreadLocale
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GlobalFlags
GetPrivateProfileStringW
WritePrivateProfileStringW
GetModuleHandleA
InterlockedDecrement
GetCurrentProcessId
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrlenA
lstrcmpA
GlobalAlloc
FormatMessageW
LocalFree
MulDiv
WideCharToMultiByte
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetCurrentThreadId
GetConsoleWindow
lstrlenW
SetLastError
GetProcAddress
SetThreadExecutionState
MultiByteToWideChar
FreeLibrary
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
CloseHandle
OpenProcess
TerminateProcess
CreateProcessW
GetVersionExW
lstrcpynW
FindResourceW
LoadResource
LockResource
SizeofResource
WaitForSingleObject
CreateMutexW
GetLastError
Sleep
OutputDebugStringW
user32
DestroyMenu
GetWindowDC
BeginPaint
EndPaint
WindowFromPoint
GetSysColorBrush
CharNextW
CopyAcceleratorTableW
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
CharUpperW
UnregisterClassW
RegisterClipboardFormatW
PostThreadMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
SetPropW
GetPropW
RemovePropW
GetLastActivePopup
DispatchMessageW
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageW
GetKeyState
SetMenu
GetMenuItemID
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
RegisterClassW
AdjustWindowRectEx
CallWindowProcW
GetMenu
SystemParametersInfoA
GetDesktopWindow
GetActiveWindow
SetActiveWindow
DestroyWindow
GetNextDlgTabItem
EndDialog
GrayStringW
DrawTextExW
TabbedTextOutW
SetRect
DrawEdge
OffsetRect
GetSysColor
DrawTextW
BringWindowToTop
ReleaseCapture
GetCapture
SetCapture
TrackMouseEvent
ClientToScreen
SetClassLongW
SetCursor
GetDlgCtrlID
IsRectEmpty
SetRectEmpty
InflateRect
DestroyCursor
GetIconInfo
FillRect
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
DefWindowProcW
GetClassInfoW
LoadCursorW
MoveWindow
MapWindowPoints
GetForegroundWindow
ScreenToClient
SetFocus
GetFocus
SetWindowTextW
GetClassLongW
IsWindowEnabled
InvalidateRect
UpdateWindow
EnumChildWindows
SendInput
GetWindowThreadProcessId
CreateDialogParamW
GetWindowPlacement
MonitorFromPoint
EnumDisplaySettingsExW
ReleaseDC
GetDC
ChangeDisplaySettingsW
FindWindowExW
GetCursorPos
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
RegisterWindowMessageW
DestroyIcon
TrackPopupMenu
RemoveMenu
SetMenuItemInfoW
LoadBitmapW
GetSubMenu
LoadMenuW
DrawIcon
GetClientRect
GetSystemMetrics
AppendMenuW
GetSystemMenu
GetMessageW
TranslateMessage
ValidateRect
IsDialogMessageW
LoadIconW
ChangeDisplaySettingsExW
EnumDisplayDevicesW
EnumDisplaySettingsW
EqualRect
IntersectRect
MonitorFromRect
GetMenuCheckMarkDimensions
CreateDialogIndirectParamW
GetMenuState
KillTimer
SetTimer
PostMessageW
GetWindowLongW
GetWindowRect
IsIconic
SetWindowPos
IsWindow
LoadStringW
ModifyMenuW
LoadImageW
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
FindWindowW
EnableWindow
SetDlgItemTextW
SendMessageW
GetDlgItem
ShowWindow
IsWindowVisible
GetParent
EnumWindows
SetWindowLongW
RedrawWindow
GetWindowTextW
PtInRect
GetWindow
SetForegroundWindow
MonitorFromWindow
GetMonitorInfoW
GetClassNameW
CopyRect
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreatePen
CreateRectRgnIndirect
GetBkColor
GetTextColor
GetRgnBox
GetMapMode
PtVisible
GetWindowExtEx
CreateFontIndirectW
GetStockObject
GetTextExtentPoint32W
StretchBlt
DeleteDC
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectW
CreateSolidBrush
SetPixelV
Polygon
CreateRectRgn
GetDeviceCaps
DeleteObject
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
Escape
ExtTextOutW
TextOutW
RectVisible
GetViewportExtEx
msimg32
GradientFill
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
shell32
Shell_NotifyIconW
ShellExecuteExW
comctl32
ImageList_Create
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_Remove
InitCommonControlsEx
ImageList_GetIconSize
shlwapi
PathFindFileNameW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoFreeUnusedLibraries
CoTaskMemFree
CoCreateInstance
IIDFromString
CoUninitialize
CoInitializeEx
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoTaskMemAlloc
oleaut32
VariantCopy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SafeArrayDestroy
Sections
.text Size: 427KB - Virtual size: 426KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ