t:\develop\global\src\Cer\bin\Release\senddmp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-30_aade0a0e651f4c9538e853c637b694e1_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-30_aade0a0e651f4c9538e853c637b694e1_icedid.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-30_aade0a0e651f4c9538e853c637b694e1_icedid
-
Size
449KB
-
MD5
aade0a0e651f4c9538e853c637b694e1
-
SHA1
e9f58eb4c189ecc9e9b657994de15ab4832cb070
-
SHA256
9c892e2a9426db99bacb25b7f2a048ee6284544c6baf82f5c1dda7c6734c9d09
-
SHA512
c49fe289eb59d05463d9dd2b7410492354cb03063fd584bcd8840a3dd4437ffa6fe594204910a4a540a5cb7dfd19cf2b27a9ee740c373dd42e66216177aedd16
-
SSDEEP
6144:ZEq8xjotXidbDrK8n3p/p5r0tdFcPupyWrudcWU4JFrmf75r9JtC18wjeNJgr5zV:erKsdbDGy3pB5wtXc1WE/F4r9u6G3B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-30_aade0a0e651f4c9538e853c637b694e1_icedid
Files
-
2024-06-30_aade0a0e651f4c9538e853c637b694e1_icedid.exe windows:4 windows x86 arch:x86
45b6527594bdf7344f4ad3d96fd15691
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
HttpQueryInfoA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetErrorDlg
InternetCloseHandle
InternetConnectA
InternetOpenA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetReadFile
HttpEndRequestA
HttpSendRequestExA
InternetWriteFile
opengl32
wglDeleteContext
glGetString
wglMakeCurrent
wglCreateContext
glGetError
kernel32
LocalReAlloc
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
FindClose
FindFirstFileA
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
GetFileAttributesA
GetFileTime
WritePrivateProfileStringA
GetCurrentDirectoryA
SetErrorMode
GetTickCount
RtlUnwind
ExitProcess
HeapFree
TlsSetValue
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
GetDriveTypeW
FindFirstFileW
GetDriveTypeA
GetSystemTimeAsFileTime
HeapReAlloc
TerminateProcess
ExitThread
CreateThread
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFullPathNameW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetCurrentDirectoryW
CreateFileW
GetLocaleInfoW
SetEnvironmentVariableA
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
RaiseException
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedDecrement
SetLastError
MulDiv
GlobalAlloc
FormatMessageA
LocalFree
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
lstrcpynA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetThreadLocale
GetACP
GetVersionExW
lstrcatA
CreateProcessA
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
MultiByteToWideChar
InterlockedExchange
lstrcpyA
GetTempPathA
WriteFile
GetModuleHandleA
GetVersionExA
GetLocaleInfoA
GetProcAddress
DeleteFileA
lstrlenA
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
GetFileSize
ReadFile
CreateFileA
CloseHandle
GetLastError
GetUserDefaultLCID
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
HeapAlloc
user32
ValidateRect
TranslateMessage
GetMessageA
MapDialogRect
SetWindowContextHelpId
GetSysColorBrush
DestroyMenu
CharNextA
IsRectEmpty
SetRect
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
GetMenuCheckMarkDimensions
LoadBitmapA
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
SetForegroundWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
EqualRect
UnregisterClassA
GetDlgCtrlID
CallWindowProcA
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
CharUpperA
LoadImageA
GetSystemMetrics
IsIconic
DrawIcon
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
DestroyWindow
PostQuitMessage
BeginPaint
EndPaint
GetClassInfoA
DefWindowProcA
WindowFromPoint
GetFocus
IsWindowVisible
ScreenToClient
ClientToScreen
PostMessageA
CopyRect
KillTimer
UpdateWindow
SetWindowLongA
LoadCursorA
CopyIcon
GetCursorPos
GetWindowDC
GrayStringA
DrawTextExA
GetSysColor
IsWindow
DrawTextA
TabbedTextOutA
wsprintfA
GetKeyState
ReleaseCapture
GetParent
SetCapture
RedrawWindow
InvalidateRect
ReleaseDC
GetDC
GetClientRect
GetWindowRect
InflateRect
PtInRect
SetCursor
GetDesktopWindow
SendMessageA
EnableWindow
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
GetMenu
CheckMenuItem
OffsetRect
gdi32
SaveDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetDeviceCaps
CreatePen
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetWindowExtEx
GetViewportExtEx
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
ChoosePixelFormat
SetPixelFormat
DescribePixelFormat
DeleteObject
CreateSolidBrush
GetTextExtentPoint32A
GetObjectA
CreateFontIndirectA
GetStockObject
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
comdlg32
GetFileTitleA
GetOpenFileNameA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegDeleteValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathAppendA
PathFindFileNameA
PathStripToRootA
UrlUnescapeA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CLSIDFromString
StgCreateDocfileOnILockBytes
StringFromGUID2
CoCreateGuid
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
StgOpenStorageOnILockBytes
CoGetClassObject
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
oleaut32
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantInit
VariantChangeType
SysAllocString
OleCreateFontIndirect
VariantClear
Sections
.text Size: 272KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE