g:\workspace\upgrade\update\release\update.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-25_a0855cc62b3e69770d48bd7f8bfd24c4_icedid.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-25_a0855cc62b3e69770d48bd7f8bfd24c4_icedid.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-25_a0855cc62b3e69770d48bd7f8bfd24c4_icedid
-
Size
404KB
-
MD5
a0855cc62b3e69770d48bd7f8bfd24c4
-
SHA1
118186291768cd2147b8e7dc8e1ecbc093163dfe
-
SHA256
8cd772c3f99016563961cac0fab50233ce63d4bfe04cf317de06f7262daa24b5
-
SHA512
446ee1825d927fc99f86239620c3838d78f53697ea507d7691dac34588e7290d4203f2084f671d840168e609312b51de1525ff25428d7730b8c22396164b504a
-
SSDEEP
6144:wotxxaIwdEzSViKhqIowiSWcXJFs/7qn82vbpQEHte5eVrH0U7:wotxs9d+c5Fs/7+5vGEg5eVrb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-25_a0855cc62b3e69770d48bd7f8bfd24c4_icedid
Files
-
2024-06-25_a0855cc62b3e69770d48bd7f8bfd24c4_icedid.exe windows:4 windows x86 arch:x86
c30f9f5caf90cc24b9004bd4547ae1f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
SetErrorMode
GetTickCount
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
ExitThread
CreateThread
HeapSize
SetStdHandle
GetFileType
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
TlsAlloc
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
UnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedIncrement
GetModuleHandleA
GlobalAddAtomW
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
CreateEventW
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GetFileTime
GetFileAttributesW
SetFileAttributesW
LocalFileTimeToFileTime
CreateFileW
GetFullPathNameW
GetVolumeInformationW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GetCurrentProcessId
FreeResource
GetVersionExW
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryW
FileTimeToLocalFileTime
lstrlenA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
lstrcmpW
FreeLibrary
GetModuleHandleW
GetProcAddress
SetLastError
MultiByteToWideChar
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
SetFileTime
SystemTimeToFileTime
TzSpecificLocalTimeToSystemTime
GetSystemTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetExitCodeProcess
WaitForSingleObject
GetPrivateProfileSectionNamesW
CopyFileW
RemoveDirectoryW
TerminateProcess
FindClose
OpenProcess
FindNextFileW
FindFirstFileW
GetCurrentProcess
WideCharToMultiByte
DeleteFileW
GetModuleFileNameW
CloseHandle
Sleep
CreateMutexW
lstrlenW
GetPrivateProfileStringW
WritePrivateProfileStringW
FindResourceW
GetPrivateProfileIntW
lstrcpyW
LoadResource
LockResource
SizeofResource
InterlockedDecrement
GetPrivateProfileSectionW
LocalFree
GetLastError
FormatMessageW
HeapDestroy
CreateDirectoryW
user32
DestroyMenu
MessageBeep
GetNextDlgGroupItem
ReleaseCapture
SetCapture
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
LoadCursorW
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ReleaseDC
GetDC
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetCursor
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
PtInRect
MessageBoxW
SendMessageW
UnregisterClassA
PostThreadMessageW
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
RegisterClipboardFormatW
UnregisterClassW
RemovePropW
LoadIconW
EnableWindow
IsIconic
InvalidateRect
GetSystemMetrics
GetClientRect
DrawIcon
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
PostMessageW
GetDesktopWindow
GetParent
SetFocus
IsWindow
IsWindowEnabled
GetFocus
SetWindowPos
MapDialogRect
SetWindowContextHelpId
GetWindow
GetLastActivePopup
GetWindowLongW
GetWindowThreadProcessId
CharUpperW
CheckMenuItem
EnableMenuItem
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EndDialog
DestroyWindow
GetDlgItem
GetNextDlgTabItem
gdi32
GetStockObject
GetBkColor
GetTextColor
GetMapMode
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
GetRgnBox
GetDeviceCaps
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
RestoreDC
SaveDC
CreateRectRgnIndirect
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
TextOutW
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
ReportEventW
RegOpenKeyW
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegisterEventSourceW
GetUserNameW
DeregisterEventSource
shell32
ShellExecuteW
ShellExecuteExW
comctl32
InitCommonControlsEx
shlwapi
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
oledlg
OleUIBusyW
ole32
CoUninitialize
CoCreateInstance
OleRun
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromString
oleaut32
SysFreeString
VariantClear
SysStringByteLen
SysAllocStringByteLen
SysStringLen
SysAllocStringLen
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
GetErrorInfo
SysAllocString
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
psapi
GetModuleFileNameExW
EnumProcesses
wininet
InternetConnectW
HttpSendRequestW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
HttpQueryInfoW
InternetQueryDataAvailable
HttpOpenRequestW
InternetSetOptionExW
Sections
.text Size: 292KB - Virtual size: 288KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ