d:\Vs2008\jbsrc\JbSet(jpg)(3.27)(use)(过滤)(开发中)\Release\JbSet.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_4a7c206abc98b6bb03022e378f0f460f_icedid.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-26_4a7c206abc98b6bb03022e378f0f460f_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_4a7c206abc98b6bb03022e378f0f460f_icedid
-
Size
716KB
-
MD5
4a7c206abc98b6bb03022e378f0f460f
-
SHA1
db0acc303c2d915e6071f11ac0f6de514bbf86d6
-
SHA256
ae4153b2b8ebffb25199939be122b799b29ed6d4499dd2eaacc0fddb583b6b85
-
SHA512
8bfc481714e74d657b6b0b0eafe4610999b75d0e97c9eac50309667934925d84fd3757a9453b0231aa66ea52d1d548d5b35540a2e34613c8e4cf565d844092db
-
SSDEEP
12288:hmiNa4XOZdIHeNaIOoAtrGlhIRHQEEPC7OacO11WG:kIawd+N98tKhG/LcO11WG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-26_4a7c206abc98b6bb03022e378f0f460f_icedid
Files
-
2024-05-26_4a7c206abc98b6bb03022e378f0f460f_icedid.exe windows:4 windows x86 arch:x86
539bb9eee1c3d3410db0414992ec5c77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
sndPlaySoundA
skinmagic
ord1
ord8
ord3
kernel32
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
VirtualAlloc
GetSystemInfo
VirtualQuery
RemoveDirectoryA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
TerminateProcess
HeapSize
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetDateFormatA
SetUnhandledExceptionFilter
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetTimeFormatA
RtlUnwind
ExitProcess
GetTickCount
GetFileTime
GetFileAttributesA
SetErrorMode
FindResourceExA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
FindFirstFileA
FileTimeToLocalFileTime
FindNextFileA
FindClose
VirtualProtect
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
FreeResource
FileTimeToSystemTime
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
SetLastError
lstrcpynA
GetModuleHandleA
GetProcAddress
DeviceIoControl
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
RaiseException
CreateFileA
GetFileInformationByHandle
CloseHandle
GetCurrentDirectoryA
lstrcpyA
GetLogicalDrives
GetDriveTypeA
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
GetPrivateProfileStringA
DeleteFileA
WritePrivateProfileStringA
CreateMutexA
GetLastError
GetModuleFileNameA
SetCurrentDirectoryA
InterlockedDecrement
FormatMessageA
lstrlenA
LocalAlloc
WideCharToMultiByte
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
InterlockedIncrement
user32
InvalidateRgn
CopyAcceleratorTableA
IsRectEmpty
CharNextA
MessageBeep
ReleaseCapture
SetCapture
GetSysColorBrush
WindowFromPoint
GetAsyncKeyState
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
SendDlgItemMessageA
GetFocus
IsChild
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
GetNextDlgGroupItem
MapWindowPoints
ScrollWindow
MessageBoxA
GetKeyState
ShowScrollBar
IsWindowVisible
GetMenu
PostMessageA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
SetScrollPos
GetWindow
SetFocus
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
PostThreadMessageA
RegisterClipboardFormatA
EndDialog
GetWindowTextLengthA
GetWindowTextA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnregisterClassA
CharUpperA
GetParent
SetForegroundWindow
GetWindowRect
FrameRect
LoadBitmapA
LoadCursorA
InvalidateRect
UpdateWindow
FillRect
OffsetRect
SetRect
PtInRect
CopyRect
GetSystemMetrics
LoadIconA
FindWindowA
GetClientRect
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
SendMessageA
EnableWindow
wsprintfA
PeekMessageA
RemovePropA
gdi32
CreatePen
CreateSolidBrush
CreateRectRgnIndirect
GetMapMode
DPtoLP
GetBkColor
GetStockObject
GetRgnBox
EnumFontFamiliesExA
MoveToEx
LineTo
SetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
SetStretchBltMode
SetBrushOrgEx
StretchBlt
SelectObject
DeleteDC
GetTextColor
CreateCompatibleDC
SetBkMode
RestoreDC
SaveDC
ExtTextOutA
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
Rectangle
CreateFontIndirectA
CreateDIBSection
DeleteObject
SetDIBColorTable
GetCurrentObject
TextOutA
SetPixel
BitBlt
CreateCompatibleBitmap
GetObjectA
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteA
comctl32
ImageList_Add
ImageList_Draw
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ord17
shlwapi
PathFindExtensionA
PathIsUNCA
PathFindFileNameA
PathStripToRootA
oledlg
ord8
ole32
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
OleRun
CoCreateInstance
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleIsCurrentClipboard
OleInitialize
oleaut32
SysAllocString
GetErrorInfo
OleCreateFontIndirect
SystemTimeToVariantTime
SafeArrayDestroy
SysStringLen
VarUdateFromDate
VariantChangeType
SysAllocStringLen
VariantClear
VariantCopy
VariantInit
SysFreeString
SysStringByteLen
SysAllocStringByteLen
gdiplus
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImagePalette
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdiplusStartup
GdiplusShutdown
GdipFree
GdipGetImageGraphicsContext
GdipDrawImageI
GdipAlloc
GdipGetImageHeight
GdipCloneImage
Sections
.text Size: 296KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 328KB - Virtual size: 326KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ