Extended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_4db9d567d04030cfb189158a0fdac2ac_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-27_4db9d567d04030cfb189158a0fdac2ac_icedid.exe
Resource
win10v2004-20240226-en
Target
2024-05-27_4db9d567d04030cfb189158a0fdac2ac_icedid
Size
14.1MB
MD5
4db9d567d04030cfb189158a0fdac2ac
SHA1
9dc272772d3a1d6739101b2e288acdf58cf5595d
SHA256
b45bcf4307b1a5da673adbbb41fe97edd2c51a1315c71f2e364a35afae7517e9
SHA512
8b687acb85e9513c4ab25de870f88648aadb04ec2cf702686c34d84347af5e40c2bdbce2a2f251374a8a910e64333722cd64ea9ef2c67ad295a04163de941077
SSDEEP
393216:bZAZp+ZIOLHFcKPBvmC6HL59zszNkENO:bZA6ZI+F5PVB6Hjs6EQ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
f:\公司产品\万能安装和卸载\万能安装\WnInstall\WnInstall\Release\WnInstall.pdb
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
SetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTimeZoneInformation
GetDriveTypeA
GetSystemTimeAsFileTime
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetCurrentProcessId
QueryPerformanceCounter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
HeapSize
TerminateProcess
HeapReAlloc
GetCommandLineA
GetStartupInfoA
GetFileType
CreateThread
ExitThread
ExitProcess
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetCurrentDirectoryA
GetFileTime
GetFileAttributesA
SetErrorMode
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetFullPathNameA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedDecrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
FreeResource
MulDiv
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
RemoveDirectoryA
lstrcpyA
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetTickCount
GlobalFree
GlobalAlloc
SetLastError
WritePrivateProfileStringA
GetVolumeInformationA
lstrcatA
GetCurrentThread
LocalAlloc
LocalFree
GetProcessHeap
HeapAlloc
GetModuleHandleA
HeapFree
GetCurrentProcess
LoadLibraryA
GetProcAddress
FreeLibrary
CreateDirectoryA
CopyFileA
GetSystemDirectoryA
MoveFileExA
WaitForSingleObject
GetExitCodeProcess
CreateFileA
DeviceIoControl
GetWindowsDirectoryA
CreateProcessA
CloseHandle
GetTempPathA
DeleteFileA
GetPrivateProfileStringA
GetPrivateProfileIntA
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedExchange
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetStringTypeA
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
IsWindowVisible
UpdateWindow
GetMenu
ReleaseDC
GetSysColor
AdjustWindowRectEx
CharUpperA
GetSysColorBrush
LoadCursorA
SetCapture
EqualRect
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowDC
BeginPaint
EndPaint
wsprintfA
PostQuitMessage
SetCursor
ValidateRect
GetCursorPos
TranslateMessage
ExitWindowsEx
GetSystemMetrics
LoadIconA
GetClientRect
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
MessageBoxA
SendMessageA
EnableWindow
GetParent
GetMessageA
MapDialogRect
SetWindowContextHelpId
PostMessageA
DestroyMenu
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
SetForegroundWindow
ExtSelectClipRgn
DeleteDC
GetStockObject
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateSolidBrush
CreateRectRgnIndirect
CreateFontA
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
ImpersonateSelf
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
LookupAccountNameA
GetFileSecurityA
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderPathA
ord17
ImageList_Destroy
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
ord8
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StgOpenStorageOnILockBytes
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocString
OleCreateFontIndirect
SysStringLen
ord21
ord23
ord22
ord20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ