Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_93dc53b9b5ccbaf2789132b07e0c550e_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-11_93dc53b9b5ccbaf2789132b07e0c550e_icedid.exe
Resource
win10v2004-20240426-en
Target
2024-06-11_93dc53b9b5ccbaf2789132b07e0c550e_icedid
Size
893KB
MD5
93dc53b9b5ccbaf2789132b07e0c550e
SHA1
2b07c5dd6aed6acb141740e35b567148b5f65d4c
SHA256
1fec3bb27f4b35a56123c0aaa5754bfae40855e492d0d68ba0af79efcc2866da
SHA512
87d3fce2090bda12de21c24ff38c69df020f2c45efffe6e77b19b40716c92c676589ce7daa93a4b3cb1accd635edee197b871f3a0d4264969a10c718ec54a49c
SSDEEP
24576:r1JwqJH4SnuC9lWTMabcQlUZ/lmR8eCVm5rpGbXv4g:1YSnuCSTMfQav4g
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
g:\Work\PCProject\ShuRuFa\程序\Trunk\DongFang\2.2.1.0815\Bin\PDB\DongFang\201507271432\Tool.pdb
SetEndOfFile
DuplicateHandle
GetFullPathNameW
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesW
GetFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
ExitProcess
ExitThread
HeapReAlloc
HeapSize
VirtualAlloc
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
UnlockFile
QueryPerformanceCounter
Sleep
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetThreadLocale
MoveFileW
lstrlenA
InterlockedIncrement
GetModuleHandleA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
MulDiv
GlobalFlags
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
GetLongPathNameW
GetTempFileNameW
SleepEx
GetSystemDirectoryA
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsW
GetDriveTypeA
InterlockedExchange
InterlockedDecrement
FreeResource
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GetVersion
lstrlenW
GetModuleHandleW
GlobalGetAtomNameW
GlobalAddAtomW
SetLastError
FindResourceW
LoadResource
LockResource
SizeofResource
CreateThread
AreFileApisANSI
FindFirstFileA
GetFileInformationByHandle
GetFullPathNameA
GetCurrentDirectoryA
GetSystemDirectoryW
GetVolumeInformationW
DeviceIoControl
ReleaseMutex
CreateMutexW
GetSystemInfo
FindFirstFileW
FindNextFileW
FindClose
GlobalLock
GlobalUnlock
SetFileAttributesW
GetFileSize
ReadFile
FormatMessageW
LocalFree
CopyFileW
MoveFileExW
OpenProcess
GlobalAlloc
GlobalFree
GetLastError
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetWindowsDirectoryW
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
WritePrivateProfileStringW
GetVersionExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateDirectoryW
GetPrivateProfileStringW
SetUnhandledExceptionFilter
VirtualProtect
WriteProcessMemory
LoadLibraryW
GetProcAddress
GetModuleFileNameW
CreateFileW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CloseHandle
FreeLibrary
GetTempPathW
VirtualFree
DeleteFileW
EndDialog
CreateDialogIndirectParamW
SetCapture
UnregisterClassW
IsRectEmpty
LoadCursorW
GetSysColorBrush
SystemParametersInfoW
GetMenuItemInfoW
InflateRect
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
FillRect
ClientToScreen
RegisterClipboardFormatW
SetWindowContextHelpId
MapDialogRect
ShowOwnedPopups
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
MoveWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
IsChild
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetWindowTextW
DispatchMessageW
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
GetClientRect
MessageBoxW
CreateWindowExW
GetClassInfoExW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
UnregisterClassA
PtInRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
GetWindowPlacement
RegisterWindowMessageW
UnpackDDElParam
ReuseDDElParam
LoadMenuW
DestroyMenu
GetClassNameW
GetSysColor
WinHelpW
SetWindowPos
SetFocus
GetActiveWindow
IsWindowEnabled
GetFocus
EqualRect
GetDlgItem
SetWindowLongW
PostThreadMessageW
MessageBeep
GetNextDlgTabItem
GetNextDlgGroupItem
InvalidateRgn
SetRect
GetKeyState
GetDlgCtrlID
CopyAcceleratorTableW
CharNextW
CharUpperW
SendDlgItemMessageW
GetMenu
LoadIconW
SetCursor
PeekMessageW
GetCapture
ReleaseCapture
LoadAcceleratorsW
SetActiveWindow
IsWindowVisible
InvalidateRect
UpdateWindow
IsIconic
SendMessageW
InsertMenuItemW
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
GetClassInfoW
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
GetLastActivePopup
SetMenu
GetWindow
ShowWindow
GetWindowLongW
IsWindow
EnableWindow
TranslateAcceleratorW
keybd_event
GetWindowRect
GetDesktopWindow
GetSystemMetrics
IsClipboardFormatAvailable
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetForegroundWindow
BringWindowToTop
GetParent
FindWindowW
PostMessageW
UnhookWindowsHookEx
CreatePatternBrush
GetStockObject
CreateSolidBrush
CreateFontIndirectW
DeleteDC
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
GetTextExtentPoint32W
CreateCompatibleBitmap
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
DeleteObject
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateCompatibleDC
PtVisible
GetFileTitleW
OpenPrinterW
DocumentPropertiesW
ClosePrinter
RegCreateKeyExA
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
OpenProcessToken
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DuplicateTokenEx
CreateProcessAsUserW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
ShellExecuteW
ShellExecuteExW
DragFinish
DragQueryFileW
SHGetSpecialFolderPathW
ord17
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathFileExistsW
PathIsUNCW
OleUIBusyW
CoFreeUnusedLibraries
OleUninitialize
CoTaskMemFree
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemAlloc
OleInitialize
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
VariantCopy
SysAllocString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
SysFreeString
SysStringLen
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
HttpQueryInfoW
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
InternetSetOptionW
InternetOpenW
GetAdaptersInfo
accept
__WSAFDIsSet
select
ioctlsocket
gethostname
listen
recvfrom
sendto
getservbyport
WSACleanup
WSAStartup
WSAGetLastError
closesocket
socket
recv
send
getsockname
ntohs
bind
htons
getsockopt
getpeername
setsockopt
connect
WSASetLastError
inet_addr
gethostbyname
inet_ntoa
htonl
getservbyname
gethostbyaddr
ord27
ord41
ord46
ord301
ord167
ord147
ord79
ord118
ord14
ord145
ord216
ord208
ord26
ord133
ord142
ord127
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ