e:\nic\##Autorun\Trunk_Autorun_TP\Autorun_code\release\Autorun.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_a33d2850a019190b8cb3c3f4cbde0fda_icedid.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-18_a33d2850a019190b8cb3c3f4cbde0fda_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-18_a33d2850a019190b8cb3c3f4cbde0fda_icedid
-
Size
413KB
-
MD5
a33d2850a019190b8cb3c3f4cbde0fda
-
SHA1
37d498b3ee29acf42350c08ef91d987cee12b846
-
SHA256
2f9cf5073e29d03f395711570a07f8d0e9a531048d9527b01fae28db7ad3daab
-
SHA512
cd49220d43f2f60134ef9069e48f8d4beade2cde72e32a9579bb821e6f044158dc2e2a02a863b31f8abd395e65fe4d8ae34ef0857ade427f185081e8e538a91b
-
SSDEEP
12288:gUEZahzF5AZykl6pvDZHSky+uaDULtvt02i:gUECz8ZykEpvDZVuaoli
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-18_a33d2850a019190b8cb3c3f4cbde0fda_icedid
Files
-
2024-08-18_a33d2850a019190b8cb3c3f4cbde0fda_icedid.exe windows:5 windows x86 arch:x86
d066612f44181306037152003fddb671
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
avifil32
AVIStreamRelease
AVIStreamGetFrame
AVIStreamInfoA
AVIStreamStart
AVIStreamSampleToTime
AVIStreamLength
AVIStreamGetFrameOpen
AVIStreamOpenFromFileA
AVIFileExit
AVIStreamGetFrameClose
AVIFileInit
msvfw32
DrawDibClose
DrawDibDraw
DrawDibOpen
kernel32
GetFileAttributesA
GetFileSizeEx
GetFileTime
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitThread
CreateThread
SetStdHandle
GetFileType
HeapSize
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetLastError
CreateMutexA
WideCharToMultiByte
FindResourceA
LoadResource
SizeofResource
LockResource
GetTempPathA
GetTickCount
Sleep
DeleteFileA
CopyFileA
GetPrivateProfileIntA
GetPrivateProfileStringA
MultiByteToWideChar
GetModuleFileNameA
CloseHandle
WaitForSingleObject
GetVersionExA
CreateProcessA
lstrlenA
MulDiv
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
SetLastError
GetProcAddress
GetModuleHandleA
FreeLibrary
lstrcmpA
InterlockedExchange
CompareStringA
LoadLibraryA
FileTimeToLocalFileTime
SetErrorMode
GetOEMCP
GetCPInfo
GlobalFlags
FileTimeToSystemTime
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThreadId
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetModuleHandleW
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
GetCurrentThread
ReadFile
GetThreadLocale
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
WritePrivateProfileStringA
FreeResource
GetCurrentProcessId
GlobalDeleteAtom
GetStringTypeW
user32
RegisterClipboardFormatA
PostThreadMessageA
InvalidateRgn
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
SetCapture
GetSysColorBrush
CharUpperA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowTextA
SetFocus
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindow
SetWindowContextHelpId
UnregisterClassA
DestroyMenu
MessageBeep
GetMessagePos
GetNextDlgGroupItem
MapDialogRect
SetWindowPos
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
MessageBoxA
PostQuitMessage
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
ReleaseDC
FindWindowA
LoadCursorA
LoadIconA
ReleaseCapture
GetWindowLongA
SetCursor
PtInRect
GetCursorPos
GetSystemMetrics
KillTimer
SetTimer
InvalidateRect
GetSysColor
OffsetRect
GetWindowRect
GetClientRect
IsWindow
EnableWindow
PostMessageA
SendMessageA
GetDC
GetParent
gdi32
SetMapMode
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
SaveDC
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
SetBkMode
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
ScaleViewportExtEx
RestoreDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
GetTextMetricsA
GetTextExtentPoint32A
CreateFontA
CreateBitmap
CreateCompatibleBitmap
BitBlt
ExtTextOutA
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegQueryValueExA
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFileExistsA
PathFindExtensionA
PathRemoveFileSpecW
oledlg
ord8
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoDisconnectObject
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
LoadTypeLi
SysAllocString
VariantCopy
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysFreeString
OleCreateFontIndirect
SysStringLen
gdiplus
GdipGetImageHeight
GdipGetImageWidth
GdipDrawImageRectI
GdipFree
GdipCreateFromHDC
GdiplusShutdown
GdiplusStartup
GdipAlloc
GdipDisposeImage
GdipDeleteGraphics
GdipLoadImageFromFile
GdipCloneImage
GdipLoadImageFromFileICM
Sections
.text Size: 294KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adate Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE