e:\darkspy_user_pub\darkspy\darkspy\Release\darkspy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_d69532ba502e0363bfac45295b6afefb_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-26_d69532ba502e0363bfac45295b6afefb_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_d69532ba502e0363bfac45295b6afefb_icedid
-
Size
660KB
-
MD5
d69532ba502e0363bfac45295b6afefb
-
SHA1
40f40c9cd52f37291ff3950f29db25859312db6c
-
SHA256
aac05eb3795ae8d9eb342301c3a0b20f1ecb54d771d5ee37f1f0521cafd1108d
-
SHA512
2bd750551aba87a1c7cba93548f73cc820b027c9722ce6ad95f3eddd8938c4771f05dba80e7c179add5eb730efa2a6c4154aae5011433bc15b71385b4eb69ff2
-
SSDEEP
12288:R59eaoWecEcB9Hs97Eed5FyFxOny+/dbvPX4AQQ0FMYI:JevWrEcBsEelyT6Ndbvn6I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-26_d69532ba502e0363bfac45295b6afefb_icedid
Files
-
2024-05-26_d69532ba502e0363bfac45295b6afefb_icedid.exe windows:4 windows x86 arch:x86
1d5e0612ed5f227afc53ab21be5d2a15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
EnumProcesses
EnumDeviceDrivers
GetDeviceDriverBaseNameA
kernel32
GetSystemInfo
VirtualQuery
RtlUnwind
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
SetStdHandle
VirtualAlloc
SetHandleCount
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
IsBadReadPtr
SetEnvironmentVariableA
HeapAlloc
HeapFree
GetFileTime
GetFileAttributesA
SetErrorMode
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
FindResourceExA
CopyFileA
FormatMessageA
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
MulDiv
SetLastError
InterlockedDecrement
WritePrivateProfileStringA
GetCurrentThread
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
lstrcmpW
lstrcpynA
GetModuleHandleA
FreeResource
GlobalFree
VirtualProtect
CompareStringW
CompareStringA
lstrlenW
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
LocalFree
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
ReadFile
IsBadCodePtr
GetCurrentProcessId
OpenProcess
TerminateProcess
Sleep
IsDBCSLeadByte
MultiByteToWideChar
GetLastError
DeviceIoControl
GetFileSize
WriteFile
lstrcmpA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
lstrcpyA
GetLogicalDriveStringsA
GetDriveTypeA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
RaiseException
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetCurrentProcess
GetVersionExA
SetUnhandledExceptionFilter
OpenMutexA
ExitProcess
CreateMutexA
CreateFileA
CloseHandle
GetSystemDirectoryA
lstrcatA
GetTickCount
OpenFile
DeleteFileA
LoadLibraryA
GetProcAddress
GetFileType
user32
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
LoadCursorA
GetSysColorBrush
IsClipboardFormatAvailable
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
DestroyMenu
SetWindowContextHelpId
GetMessageA
TranslateMessage
ValidateRect
SetCursor
PostQuitMessage
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
CheckMenuItem
GetMenuCheckMarkDimensions
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
IsChild
GetWindowTextLengthA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
EnableWindow
MessageBoxA
ExitWindowsEx
DrawIcon
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
GetWindowRect
GetClientRect
LoadIconA
GetSystemMetrics
wsprintfA
SetWindowLongA
SetForegroundWindow
IsWindowVisible
GetMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
ScreenToClient
EqualRect
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
GetWindow
GetDesktopWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetNextDlgTabItem
EndDialog
MapDialogRect
SetWindowPos
ShowWindow
GetCapture
GetActiveWindow
GetAsyncKeyState
GetFocus
SetFocus
PostMessageA
GetDlgItem
IsWindowEnabled
UnregisterClassA
CharUpperA
PostThreadMessageA
GetWindowTextA
GetWindowLongA
PtInRect
FillRect
DrawTextA
EnableMenuItem
GetSubMenu
DragDetect
RedrawWindow
SetCapture
CreateCaret
SetCaretPos
ShowCaret
DestroyCaret
EnableScrollBar
SetScrollInfo
ReleaseCapture
RegisterClipboardFormatA
EmptyClipboard
GetSysColor
SetScrollPos
GetKeyState
CreatePopupMenu
InsertMenuItemA
UpdateWindow
GetParent
GetCursorPos
SetActiveWindow
GetDC
LoadBitmapA
gdi32
GetMapMode
GetRgnBox
GetTextColor
GetBkColor
EnumFontFamiliesExA
CopyMetaFileA
CreateRectRgnIndirect
GetDeviceCaps
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
RectVisible
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontA
CreateSolidBrush
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
SetBoundsRect
GetCharWidthA
GetTextExtentPoint32A
TextOutA
BitBlt
SelectObject
PtVisible
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegOpenKeyA
RegCreateKeyExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
ControlService
ChangeServiceConfigA
QueryServiceStatus
StartServiceA
CreateServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegQueryValueA
RegCloseKey
RegEnumKeyA
RegDeleteKeyA
RegRestoreKeyA
RegSaveKeyA
RegEnumValueA
RegQueryValueExA
GetUserNameA
LookupAccountNameA
comctl32
ord17
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
OleFlushClipboard
OleIsCurrentClipboard
CoTaskMemAlloc
CoTaskMemFree
ReleaseStgMedium
OleGetClipboard
CLSIDFromString
CLSIDFromProgID
OleDuplicateData
CoRegisterMessageFilter
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleSetClipboard
CreateStreamOnHGlobal
oleaut32
SysFreeString
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
SysStringLen
SysAllocStringByteLen
OleCreateFontIndirect
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
ws2_32
htonl
htons
Sections
.text Size: 220KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 136KB - Virtual size: 350KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE