d:\同級生2\setup\UnInst\ReleaseDVD\UnInst.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_1e7ed45298eb14855edb129a1cd20b55_icedid.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-10_1e7ed45298eb14855edb129a1cd20b55_icedid.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_1e7ed45298eb14855edb129a1cd20b55_icedid
-
Size
222KB
-
MD5
1e7ed45298eb14855edb129a1cd20b55
-
SHA1
1548408e2346fe1aaa9bbc276a33a2fdd2e1f21a
-
SHA256
25957d2d671bdf059525328564e5c6bc56f1459324b21c008e96c7cddfc7a9cc
-
SHA512
fcb9045c9487610bb936db9f09b02f52b0b2b6daf0a1ebc42636ead7579881d369945275628011f283754e6f53790f855bccca3438bd18d56e637d7a82a4ef45
-
SSDEEP
6144:TGsp+orHgaSR1qcmj+lMAtqyffZ0GehwPfL:TZSR1qFj+lMAtq2m7+r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-10_1e7ed45298eb14855edb129a1cd20b55_icedid
Files
-
2024-07-10_1e7ed45298eb14855edb129a1cd20b55_icedid.exe windows:5 windows x86 arch:x86
f42a70eb7395b6d5f9f0b26583cec631
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileTime
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
GetCommandLineA
GetStartupInfoA
HeapAlloc
Sleep
ExitProcess
VirtualAlloc
HeapReAlloc
HeapSize
GetACP
IsValidCodePage
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetFileSizeEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetFileAttributesA
FileTimeToLocalFileTime
SetErrorMode
GetOEMCP
GetCPInfo
FileTimeToSystemTime
GetModuleHandleW
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
FreeResource
GlobalAddAtomA
InterlockedDecrement
GetModuleFileNameW
GlobalFree
GlobalUnlock
FormatMessageA
LocalFree
MultiByteToWideChar
MulDiv
GetCurrentProcessId
GetLastError
SetLastError
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
WideCharToMultiByte
CompareStringA
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedExchange
GlobalLock
GlobalAlloc
FreeLibrary
GetModuleHandleA
GetProcAddress
GetShortPathNameA
lstrcatA
FindNextFileA
lstrcpyA
GetModuleFileNameA
GetTempPathA
FindFirstFileA
SetFileAttributesA
FindClose
DeleteFileA
CopyFileA
lstrlenA
lstrcmpA
GetCurrentProcess
OpenMutexA
CloseHandle
CreateMutexA
WaitForSingleObject
ReleaseMutex
GetEnvironmentStrings
GetVersionExA
user32
DestroyMenu
UnregisterClassA
GetSysColorBrush
LoadCursorA
CharUpperA
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
GetMenu
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetWindow
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ExitWindowsEx
DrawIcon
SendMessageA
IsIconic
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
PtInRect
GetClientRect
LoadIconA
GetSystemMetrics
EnableWindow
GetDesktopWindow
PostQuitMessage
PostMessageA
MessageBoxA
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
GetWindowThreadProcessId
GetSubMenu
GetMenuItemCount
GetMenuItemID
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
UnhookWindowsHookEx
GetMenuState
CopyRect
gdi32
GetStockObject
DeleteDC
TextOutA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetDeviceCaps
RectVisible
PtVisible
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
ExtTextOutA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegFlushKey
RegEnumValueA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
RegDeleteKeyA
RegEnumKeyExA
OpenProcessToken
shell32
SHFileOperationA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
ShellExecuteExA
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ