c:\TFSProj\HaspSuite\bin\release\HKCustomer30.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-19_4a0713c7e25c522cc5c67d60ccf49b23_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-19_4a0713c7e25c522cc5c67d60ccf49b23_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-19_4a0713c7e25c522cc5c67d60ccf49b23_icedid
-
Size
965KB
-
MD5
4a0713c7e25c522cc5c67d60ccf49b23
-
SHA1
2d322bde88e8c0706b545c933ef9cf881b95d84b
-
SHA256
3fe38b0edbc3646b075121c6d48c58787fe444c185177ecdf76f1668e15ee382
-
SHA512
789ca2afbc748601b87c13673340ee75ecaff2459841bee429c1d9a09ba3dd19ad7dab7a7abf69780c268e30b47d8fe5bc679ad85611bdc47d2af4a8b80ef4e2
-
SSDEEP
12288:YsKqfWwYUQaiTeZbzvFCgQn0TKQgcnaDHKuHtKtp+aVbN46V2HhJq3oM8q/DXm70:NW9aiKen0TKvT0lV2HhA8q7Wq0dc4+uo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-19_4a0713c7e25c522cc5c67d60ccf49b23_icedid
Files
-
2024-05-19_4a0713c7e25c522cc5c67d60ccf49b23_icedid.exe windows:5 windows x86 arch:x86
e8425d146d4f7375db0bc089c676916e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapReAlloc
RtlUnwind
RaiseException
VirtualAlloc
Sleep
ExitProcess
HeapSize
GetACP
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
UnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
OpenSemaphoreA
CreateSemaphoreA
SearchPathA
FindNextFileA
GetVersion
GetProcessHeap
GetSystemTime
GetEnvironmentVariableA
ReleaseMutex
CreateMutexA
InterlockedCompareExchange
DeviceIoControl
TerminateProcess
GetFileTime
GetFileSizeEx
GetFileAttributesA
FileTimeToLocalFileTime
SetErrorMode
GetOEMCP
GetCPInfo
GlobalFlags
FindResourceExA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetModuleHandleW
SystemTimeToFileTime
FileTimeToSystemTime
InterlockedDecrement
GetModuleFileNameW
WaitForSingleObject
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcessId
GetModuleFileNameA
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
lstrcmpW
GetVersionExA
GetProcAddress
GetModuleHandleA
LoadLibraryA
VirtualProtect
GetLastError
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
ReleaseSemaphore
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
lstrlenA
MultiByteToWideChar
GetLocalTime
FindResourceA
LoadResource
LockResource
SizeofResource
GetFileType
WideCharToMultiByte
user32
IsDialogMessageA
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
IsWindow
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetClientRect
SetWindowTextA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
GetSysColor
AdjustWindowRectEx
ScreenToClient
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GetWindowTextLengthA
GetWindowTextA
GetWindow
SetPropA
GetCapture
GetActiveWindow
GetParent
PostMessageA
EnableWindow
SendMessageA
SetActiveWindow
MapDialogRect
SetWindowPos
ShowWindow
GetPropA
RemovePropA
GetAsyncKeyState
GetFocus
SetFocus
GetWindowRect
GetWindowLongA
GetDlgItem
IsWindowEnabled
CharUpperA
PostQuitMessage
ValidateRect
GetMenuState
MessageBoxA
ShowCaret
GetDC
GetSubMenu
GetMenuItemCount
GetMenuItemID
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
ReleaseDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
GetMessageA
TranslateMessage
RegisterClassA
GetCursorPos
SetMenuItemBitmaps
gdi32
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
EnumFontFamiliesExA
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateFontIndirectA
SetWindowExtEx
GetObjectA
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
shell32
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
SHBrowseForFolderA
comctl32
InitCommonControlsEx
shlwapi
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 695KB - Virtual size: 694KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 61KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ