d:\jenkins\workspace\srf_develop\ShuRuFa\程序\Trunk\Bin\pdbmap\WanNengWB\Tool32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-17_1fd69796d96b9ec9e9e3e02ffb4023f7_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-17_1fd69796d96b9ec9e9e3e02ffb4023f7_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-17_1fd69796d96b9ec9e9e3e02ffb4023f7_icedid
-
Size
1.9MB
-
MD5
1fd69796d96b9ec9e9e3e02ffb4023f7
-
SHA1
bfb9b0b2135779ef317ae4cb8c08502db1c6b486
-
SHA256
69b73d94b6e5d850f96e3a6c58c16e7c5fa309748e57bca9cb190da3498e282a
-
SHA512
3a98e8f62fd5e9ecb3d3fefcc0e0d51545c03524afc43c5b50300c9419403c3f9a13f1f26d863d32e51c550cc1e498712255aeb6c2bc53472f4e47adcc8a1650
-
SSDEEP
49152:zPXgqJv1c9LaIgwmQvhbo19rS7Ibrmp/UGMg1E:7bJtc9beQKNS7B0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-17_1fd69796d96b9ec9e9e3e02ffb4023f7_icedid
Files
-
2024-05-17_1fd69796d96b9ec9e9e3e02ffb4023f7_icedid.exe windows:4 windows x86 arch:x86
8f3c80fca856cc50b9a9b1b6daf17cf1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetModuleHandleA
InterlockedIncrement
lstrlenA
GetThreadLocale
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetFullPathNameW
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileTime
GetStartupInfoW
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetDriveTypeA
FindFirstFileA
HeapReAlloc
ExitThread
ExitProcess
HeapSize
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GlobalHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetFullPathNameA
GetCurrentDirectoryA
SetConsoleCtrlHandler
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
SetConsoleMode
ReadConsoleInputA
GetFileInformationByHandle
FlushConsoleInputBuffer
GlobalMemoryStatus
ExpandEnvironmentStringsW
WaitForMultipleObjects
PeekNamedPipe
GetSystemDirectoryA
SleepEx
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
FreeResource
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
lstrcmpW
GetVersionExA
GetVersion
GlobalGetAtomNameW
GlobalAddAtomW
SetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
WriteFile
GetTempFileNameW
GetFileAttributesW
HeapFree
IsBadReadPtr
LoadLibraryA
VirtualFree
VirtualAlloc
GetProcessHeap
HeapAlloc
GetLongPathNameW
MoveFileW
CreateThread
AreFileApisANSI
GetSystemDirectoryW
GetVolumeInformationW
DeviceIoControl
MulDiv
Sleep
ReleaseMutex
CreateMutexW
OutputDebugStringW
DeleteFileA
CreateDirectoryA
InterlockedDecrement
GetModuleHandleW
VerSetConditionMask
VerifyVersionInfoW
FindFirstFileW
FindNextFileW
FindClose
RemoveDirectoryW
GlobalLock
GlobalUnlock
SetFileAttributesW
GetSystemInfo
FormatMessageW
LocalFree
CopyFileW
MoveFileExW
GlobalAlloc
GlobalFree
GetCommandLineW
CreateRemoteThread
GetExitCodeThread
ReadProcessMemory
WaitForSingleObject
GetExitCodeProcess
GetWindowsDirectoryW
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
OpenProcess
GetLogicalDriveStringsW
lstrcmpiW
QueryDosDeviceW
lstrlenW
WritePrivateProfileStringW
GetEnvironmentVariableW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
QueryPerformanceCounter
GetPrivateProfileStringW
QueryPerformanceFrequency
SetUnhandledExceptionFilter
VirtualProtect
WriteProcessMemory
GetLocalTime
CreateDirectoryW
GetCurrentThreadId
GetCurrentProcessId
CloseHandle
CreateProcessW
CreateFileW
GetFileSize
ReadFile
GetLastError
GetModuleFileNameW
GetCurrentProcess
LoadLibraryW
GetProcAddress
FreeLibrary
GetTempPathW
SetHandleCount
DeleteFileW
user32
UnregisterClassW
IsRectEmpty
LoadCursorW
GetSysColorBrush
GetMenuItemInfoW
InflateRect
EndPaint
BeginPaint
GetWindowDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
FillRect
RegisterClipboardFormatW
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
MoveWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageW
SendDlgItemMessageA
IsChild
SetWindowsHookExW
SetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
DispatchMessageW
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
PostThreadMessageW
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
GetClientRect
MessageBoxW
CreateWindowExW
PostMessageW
FindWindowW
SetForegroundWindow
ShowWindow
IsWindow
GetParent
GetClassInfoExW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
GetWindowPlacement
RegisterWindowMessageW
GetSysColor
UnpackDDElParam
ReuseDDElParam
LoadMenuW
DestroyMenu
WinHelpW
SetWindowPos
SetFocus
GetActiveWindow
CharUpperW
CharNextW
CopyAcceleratorTableW
SetRect
InvalidateRgn
IsWindowEnabled
EqualRect
GetNextDlgGroupItem
CreateDialogIndirectParamW
EndDialog
CallNextHookEx
BringWindowToTop
AttachThreadInput
UnregisterClassA
MessageBoxA
GetProcessWindowStation
GetUserObjectInformationW
GetWindowThreadProcessId
ClientToScreen
GetForegroundWindow
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
IsClipboardFormatAvailable
GetSystemMetrics
GetDesktopWindow
GetWindowRect
GetClassNameW
keybd_event
GetWindowTextW
FindWindowExW
GetFocus
MessageBeep
UnhookWindowsHookEx
GetNextDlgTabItem
CharLowerW
GetMonitorInfoW
SystemParametersInfoW
EnumDisplayMonitors
PtInRect
MonitorFromPoint
ReleaseDC
GetDC
TranslateAcceleratorW
EnableWindow
GetWindowLongW
GetWindow
GetDlgItem
SetWindowLongW
GetKeyState
GetDlgCtrlID
GetMenu
LoadIconW
SetCursor
PeekMessageW
GetCapture
ReleaseCapture
LoadAcceleratorsW
SetActiveWindow
IsWindowVisible
InvalidateRect
UpdateWindow
IsIconic
SendMessageW
InsertMenuItemW
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
GetClassInfoW
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
GetLastActivePopup
SetMenu
gdi32
CreateSolidBrush
CreateFontIndirectW
GetTextExtentPoint32W
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetStockObject
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
Escape
ExtTextOutW
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
TextOutW
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
SetNamedSecurityInfoW
ReportEventA
DeregisterEventSource
RegQueryValueW
RegDeleteKeyW
RegCreateKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
RegisterEventSourceA
RegEnumKeyW
RegOpenKeyW
RegCreateKeyExA
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DuplicateTokenEx
CreateProcessAsUserW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
DragFinish
DragQueryFileW
ShellExecuteW
comctl32
ord17
shlwapi
PathRemoveFileSpecA
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathFileExistsW
PathFileExistsA
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
CoFreeUnusedLibraries
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoUninitialize
CLSIDFromString
OleUninitialize
oleaut32
SysAllocString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysStringLen
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
GetErrorInfo
SysFreeString
urlmon
URLDownloadToFileW
wininet
HttpQueryInfoW
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
InternetSetOptionW
InternetOpenW
gdiplus
GdiplusShutdown
GdiplusStartup
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
psapi
GetModuleFileNameExW
EnumProcesses
iphlpapi
GetAdaptersInfo
ws2_32
__WSAFDIsSet
select
ioctlsocket
gethostname
listen
getservbyport
gethostbyaddr
getservbyname
accept
recvfrom
shutdown
sendto
htonl
inet_ntoa
gethostbyname
inet_addr
WSASetLastError
WSACleanup
WSAStartup
WSAGetLastError
closesocket
socket
recv
send
getsockname
ntohs
bind
htons
getsockopt
getpeername
connect
setsockopt
Exports
Exports
curl_easy_cleanup
curl_easy_duphandle
curl_easy_escape
curl_easy_getinfo
curl_easy_init
curl_easy_pause
curl_easy_perform
curl_easy_recv
curl_easy_reset
curl_easy_send
curl_easy_setopt
curl_easy_strerror
curl_easy_unescape
curl_escape
curl_formadd
curl_formfree
curl_formget
curl_free
curl_getdate
curl_getenv
curl_global_cleanup
curl_global_init
curl_global_init_mem
curl_maprintf
curl_mfprintf
curl_mprintf
curl_msnprintf
curl_msprintf
curl_multi_add_handle
curl_multi_assign
curl_multi_cleanup
curl_multi_fdset
curl_multi_info_read
curl_multi_init
curl_multi_perform
curl_multi_remove_handle
curl_multi_setopt
curl_multi_socket
curl_multi_socket_action
curl_multi_socket_all
curl_multi_strerror
curl_multi_timeout
curl_mvaprintf
curl_mvfprintf
curl_mvprintf
curl_mvsnprintf
curl_mvsprintf
curl_share_cleanup
curl_share_init
curl_share_setopt
curl_share_strerror
curl_slist_append
curl_slist_free_all
curl_strequal
curl_strnequal
curl_unescape
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 364KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 52KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE