e:\release\7.4.x\driver\bin\DriverWizard.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-22_14d3dd2b9db7797a17469ee22606b284_icedid.exe
Resource
win7-20240708-en
General
-
Target
2024-07-22_14d3dd2b9db7797a17469ee22606b284_icedid
-
Size
4.1MB
-
MD5
14d3dd2b9db7797a17469ee22606b284
-
SHA1
10500cdf2c3536076622a10089095a03ff1ef4fa
-
SHA256
b617b38bfc1d98c4e29fa5a33f698f219600019a838e371605e2efd7763c3fd6
-
SHA512
76711fe6fc2504b029e60e1c2b770c90325d79fe75a63634cdbe3340016e0f4f3c98218f20d84e5e1bd429c05c1f751ee0cd75003bcff293bfaeda2759bd245e
-
SSDEEP
12288:ZT50+5qogBmNBbkCUAYn1UxZBYaxdPqmehqfLkoosfmebjgsc9Tg8VOdMssiV:dK+5qobHq1U/qjuos5ja9Tg8gdM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-22_14d3dd2b9db7797a17469ee22606b284_icedid
Files
-
2024-07-22_14d3dd2b9db7797a17469ee22606b284_icedid.exe windows:5 windows x86 arch:x86
35a0b998925fbb16edfc30ff0690086a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
psapi
EnumProcesses
GetModuleFileNameExA
EnumProcessModules
gdiplus
GdiplusShutdown
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawImageRectI
GdipFree
GdipAlloc
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdipDisposeImage
GdipCloneImage
GdipGetImageWidth
GdipGetImageHeight
GdipImageGetFrameDimensionsCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageSelectActiveFrame
GdipGetPropertyItemSize
GdipGetPropertyItem
GdiplusStartup
kernel32
GlobalDeleteAtom
GlobalAddAtomA
VirtualProtect
FindNextFileA
FileTimeToSystemTime
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
FreeResource
FlushFileBuffers
LockFile
UnlockFile
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalFlags
FindResourceExA
GetCPInfo
GetOEMCP
GetFileSizeEx
SetErrorMode
RtlUnwind
HeapFree
HeapAlloc
RemoveDirectoryA
HeapReAlloc
GetStartupInfoA
VirtualAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsValidCodePage
LCMapStringA
HeapCreate
VirtualFree
GetCurrentThread
GetStringTypeA
GetStringTypeW
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetDriveTypeA
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
ConvertDefaultLocale
MoveFileExA
GetLastError
GetCurrentProcess
GetVersionExA
FindResourceA
SizeofResource
LockResource
LoadResource
WideCharToMultiByte
DeleteFileA
FreeLibrary
GetCommandLineA
EnumResourceLanguagesA
LoadLibraryExA
CompareStringA
lstrcmpA
GlobalFree
lstrlenA
RaiseException
InterlockedExchange
MulDiv
MultiByteToWideChar
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetVersionExW
GetCurrentThreadId
GetStdHandle
SetCurrentDirectoryW
GetCurrentDirectoryW
GetModuleHandleW
GetCurrentProcessId
CreateProcessW
GetModuleFileNameW
LoadLibraryW
GetTempPathW
GetWindowsDirectoryW
GetSystemDirectoryW
SetFileTime
SetFileAttributesW
GetTempFileNameW
CreateDirectoryW
GetFileSize
SetFilePointer
WriteFile
ReadFile
LoadLibraryA
SetEndOfFile
CreateFileW
LCMapStringW
InterlockedDecrement
InterlockedIncrement
LocalFileTimeToFileTime
GetLocaleInfoA
GetModuleFileNameA
CloseHandle
CreateFileA
GetPrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileStringA
Sleep
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleA
GetProcAddress
LocalFree
LocalAlloc
FormatMessageA
GetSystemDirectoryA
GetWindowsDirectoryA
GetFileAttributesA
SetFileAttributesA
FindClose
FindFirstFileA
WaitForSingleObject
DosDateTimeToFileTime
FileTimeToLocalFileTime
MoveFileExW
GetFileTime
CompareFileTime
GetTickCount
GetCurrentDirectoryA
GetExitCodeThread
TerminateThread
CreateThread
GetDefaultCommConfigA
GetACP
DeviceIoControl
MoveFileA
CreateDirectoryA
SetLastError
OpenProcess
GetProfileStringA
WriteProfileStringA
SetEnvironmentVariableA
CreateProcessA
GetTimeFormatA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
CopyFileA
GetTempPathA
GetTempFileNameA
user32
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
DrawFocusRect
CharUpperA
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetClassLongA
GetClassNameA
GetForegroundWindow
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
CopyRect
PtInRect
DefWindowProcA
CallWindowProcA
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowTextLengthA
GetWindowTextA
MoveWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SendDlgItemMessageA
CheckRadioButton
CheckDlgButton
SetPropA
GetCapture
SetActiveWindow
MapDialogRect
SetWindowPos
GetPropA
RemovePropA
SetFocus
GetDlgItem
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
wvsprintfW
wvsprintfA
GetAsyncKeyState
KillTimer
SetTimer
InvalidateRect
ReleaseDC
GetWindowDC
GetDC
LoadBitmapA
PostMessageA
GetParent
GetWindowRect
SendNotifyMessageA
EnableWindow
GetClientRect
FillRect
GetSysColor
GetWindow
SendMessageA
ExitWindowsEx
GetDesktopWindow
MessageBoxA
ShowWindow
gdi32
DeleteDC
CreateCompatibleDC
GetStockObject
CreateFontIndirectA
DPtoLP
GetTextMetricsA
EnumFontFamiliesExA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
GetTextExtentPoint32A
GetDeviceCaps
CreateBitmap
GetClipBox
CreateSolidBrush
SetTextColor
comdlg32
GetFileTitleA
winspool.drv
EnumPrinterDriversA
ClosePrinter
OpenPrinterA
AddPortA
EnumMonitorsA
GetPrinterA
ord201
EnumPrintersA
DeletePrinter
DeletePrinterConnectionA
SetJobA
EnumJobsA
DeletePrinterDriverA
SetPrinterA
DocumentPropertiesA
DocumentPropertiesW
EnumPortsA
ord202
GetPrinterDriverDirectoryA
GetPrintProcessorDirectoryA
ConfigurePortA
AddPrinterA
advapi32
QueryServiceStatus
RegQueryValueA
ConvertStringSecurityDescriptorToSecurityDescriptorW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
RegQueryValueExW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyA
RegEnumKeyA
EnumServicesStatusA
OpenServiceA
OpenSCManagerA
QueryServiceConfigA
DeleteService
AdjustTokenPrivileges
ControlService
StartServiceA
CloseServiceHandle
GetExplicitEntriesFromAclA
EqualSid
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
GetAclInformation
RegGetKeySecurity
GetSecurityDescriptorDacl
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
AllocateAndInitializeSid
FreeSid
OpenProcessToken
LookupPrivilegeValueA
shell32
SHGetFolderLocation
ord155
SHChangeNotify
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
ShellExecuteExA
comctl32
ord17
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
ole32
CreateStreamOnHGlobal
oleaut32
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 559KB - Virtual size: 559KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 193KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE