Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-19_42b518613fc0ab835c2a25d5820fd890_icedid.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-19_42b518613fc0ab835c2a25d5820fd890_icedid.exe
Resource
win10v2004-20240611-en
Target
2024-06-19_42b518613fc0ab835c2a25d5820fd890_icedid
Size
1.9MB
MD5
42b518613fc0ab835c2a25d5820fd890
SHA1
15e6bfd8b295c53c5b4f03489332430f5115ee18
SHA256
caad1a2aaffcc17207d78f350fd18f8c2f50d1a839335759c6c63b79dd3dea44
SHA512
79620d22a6d7e1a7a8be23246471557acf0aa665a892195213e84bb5000c320f9b36049ce5d6e90fbc9fa8bda89fab3d257ad6a7243ddec9eb67cb6fb7141256
SSDEEP
49152:Yii8V839fsRczgM+G+rIMHQiSUYYNzrbWsa6:Yii8utfs2zgW+XHh1zXWN6
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
FlushFileBuffers
SetEndOfFile
GetCurrentProcess
GetFullPathNameA
GetModuleHandleW
SystemTimeToFileTime
FindResourceExA
GetCPInfo
GetOEMCP
SetErrorMode
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetFileAttributesA
RtlUnwind
RaiseException
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapFree
HeapAlloc
GetProcessHeap
SetConsoleCtrlHandler
SetStdHandle
ExitThread
CreateThread
VirtualAlloc
HeapReAlloc
HeapSize
TerminateProcess
SetFilePointer
SetUnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetACP
IsValidCodePage
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
HeapCreate
VirtualFree
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
CreateDirectoryA
GetDriveTypeA
SetCurrentDirectoryA
WriteFile
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetCurrentDirectoryA
WritePrivateProfileStringA
FreeResource
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
VirtualProtect
GetCurrentProcessId
InterlockedDecrement
GetModuleFileNameW
GlobalFree
GlobalUnlock
lstrlenA
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
ExpandEnvironmentStringsA
SetLastError
RemoveDirectoryA
DeleteFileA
QueryPerformanceCounter
GetSystemInfo
CreateFileA
ReadFile
GetFileType
GetFileInformationByHandle
DeviceIoControl
FileTimeToLocalFileTime
FileTimeToSystemTime
Sleep
CreateHardLinkA
SetHandleInformation
UnlockFile
LockFileEx
FindNextFileA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetVersionExA
GetStartupInfoA
FindFirstFileA
FindClose
GetComputerNameA
GetCompressedFileSizeA
FormatMessageA
LocalFree
SetEnvironmentVariableW
GetTempPathA
GetModuleFileNameA
MulDiv
GetModuleHandleA
ExitProcess
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
MultiByteToWideChar
MoveFileExA
GetLastError
UnhandledExceptionFilter
GetCommandLineA
GetClassLongA
GetClassNameA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
SetPropA
GetCapture
SetActiveWindow
SetWindowPos
ShowWindow
GetPropA
RemovePropA
GetAsyncKeyState
GetDlgItem
GetWindowTextLengthA
GetWindow
SetFocus
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
UnhookWindowsHookEx
CopyRect
IsWindow
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetCursorPos
GetClientRect
GetWindowRect
PtInRect
SendMessageA
LoadIconA
EnableWindow
SendMessageTimeoutA
GetActiveWindow
LoadCursorA
SetCursor
EnumWindows
GetWindowTextA
PostMessageA
MapDialogRect
PeekMessageA
PostQuitMessage
ReleaseDC
GetDC
GetParent
KillTimer
SetTimer
UnregisterClassA
GetSysColorBrush
DestroyMenu
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetWindowThreadProcessId
SetForegroundWindow
SetMapMode
DeleteObject
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
DPtoLP
EnumFontFamiliesExA
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetTextExtentPoint32A
GetDeviceCaps
CreateFontIndirectA
GetObjectA
CommDlgExtendedError
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetUserNameA
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHChangeNotify
PathFindFileNameA
PathRemoveFileSpecW
PathFindExtensionA
StringFromCLSID
CoTaskMemFree
OleInitialize
CoCreateInstance
OleUninitialize
CoUninitialize
CoInitializeEx
VariantInit
VariantChangeType
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ