U:\global\Release\bin\acad\WSCADMgrCtrlUtility.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-20_535e98675622b08ef2adac917e77100a_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-20_535e98675622b08ef2adac917e77100a_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-20_535e98675622b08ef2adac917e77100a_icedid
-
Size
365KB
-
MD5
535e98675622b08ef2adac917e77100a
-
SHA1
1cfde17ca231ad3c18bec1fa04ef9fc871b24870
-
SHA256
23c6e73ab387281cc4f2a73ebd1733282fc5fc5391f5724bcbd4b7560a6a147c
-
SHA512
306cbb083d8144fb8a65d2b01a6d0410b99c0bcb8eba9f7072adaafb069fb979b60c03465263604a11e283b28d19e2b71217c2cdca45b23dc6ffe2bc5a2a8a87
-
SSDEEP
3072:S8ikP4FIUpYBo2Iog4LyFEj3O7qs44NUgcSc69WjZX4jTDGaQ/xrHS9sf2QQRsEy:S9+avnYjcuTSW5VbSQQR0JVF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-20_535e98675622b08ef2adac917e77100a_icedid
Files
-
2024-05-20_535e98675622b08ef2adac917e77100a_icedid.exe windows:4 windows x86 arch:x86
ce16f38a411a52f719e523c78422edc2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
GetSystemInfo
VirtualQuery
SetStdHandle
SetEnvironmentVariableA
TerminateProcess
HeapReAlloc
RaiseException
GetCommandLineA
GetStartupInfoA
HeapFree
HeapAlloc
ExitProcess
RtlUnwind
WritePrivateProfileStringA
GetFileTime
FileTimeToLocalFileTime
SetErrorMode
FileTimeToSystemTime
GetOEMCP
GetCPInfo
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GlobalFlags
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
InterlockedDecrement
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
CloseHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
VirtualProtect
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
lstrcpyA
GetModuleHandleA
GetLastError
SetLastError
MulDiv
GlobalAlloc
FormatMessageA
lstrcpynA
LocalFree
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetProcAddress
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
LoadLibraryA
FreeLibrary
GetModuleFileNameA
lstrlenA
GetFileAttributesA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SetHandleCount
SizeofResource
user32
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MapDialogRect
GetAsyncKeyState
wsprintfA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadBitmapA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
SetForegroundWindow
IsWindowVisible
UpdateWindow
ReleaseDC
GetMenu
PostMessageA
GetSysColor
AdjustWindowRectEx
ScreenToClient
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
EnableWindow
SendMessageA
GetKeyState
GetWindowPlacement
CopyRect
PtInRect
GetWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
CharUpperA
MessageBoxA
LoadIconA
GetDesktopWindow
GetWindowRect
GetParent
GetClientRect
DestroyMenu
LoadCursorA
GetSysColorBrush
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GetMenuCheckMarkDimensions
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
DeleteObject
SetMapMode
GetClipBox
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
GetDeviceCaps
SetTextColor
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyA
RegEnumKeyA
RegQueryValueA
RegCloseKey
comctl32
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
oleaut32
VariantInit
VariantChangeType
VariantClear
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
reajpbhk Size: 8KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 144KB - Virtual size: 144KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE