D:\RAEmulatePlayBack.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_b72eec188f173e07cbe2899271fb4824_icedid.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-06_b72eec188f173e07cbe2899271fb4824_icedid.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_b72eec188f173e07cbe2899271fb4824_icedid
-
Size
292KB
-
MD5
b72eec188f173e07cbe2899271fb4824
-
SHA1
51a90aac2726f276498c84f79cbb28f951e85e8d
-
SHA256
57700cc72ef13816ccccb9e66b6b41d7dc34227e4697065122d9e8fb17b4b570
-
SHA512
4da86b3abd1fe9027782410dde9659b4c0ef3b23a9ea601cbdd3b9ddbef8d9708b14b18a19779cf0116b592587b293d0f5a102b64c1ac064afcf20876f3c0010
-
SSDEEP
6144:9sUVZ2n1txirCXj0YLuaXXlW7oIttkxFb1af+EP:9syZM1LF0YBXxxFHEP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-06_b72eec188f173e07cbe2899271fb4824_icedid
Files
-
2024-09-06_b72eec188f173e07cbe2899271fb4824_icedid.exe windows:4 windows x86 arch:x86
dcdfc957142d7ba8aafecb1d3e9085f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetErrorMode
GetTickCount
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
UnlockFile
LockFile
FlushFileBuffers
GetFullPathNameA
GetFileTime
GetFileAttributesA
InterlockedDecrement
WritePrivateProfileStringA
SetLastError
GlobalFree
MulDiv
GlobalUnlock
FormatMessageA
GetCurrentThread
GlobalLock
GlobalAlloc
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
InterlockedIncrement
FreeResource
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
SetEndOfFile
MoveFileA
DeleteFileA
WriteFile
GetCurrentThreadId
GetFileSize
SetFilePointer
ExpandEnvironmentStringsA
GetModuleFileNameA
GetCurrentProcessId
TerminateProcess
LocalAlloc
LocalFree
CreateThread
ResumeThread
Sleep
CreateFileA
ReadFile
CloseHandle
TerminateThread
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
QueryPerformanceCounter
InterlockedExchange
user32
InvalidateRgn
CopyAcceleratorTableA
SetRect
IsRectEmpty
LoadCursorA
GetSysColorBrush
ReleaseCapture
InvalidateRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
SetWindowContextHelpId
MapDialogRect
wsprintfA
ReleaseDC
GetDC
CreateDialogIndirectParamA
EndDialog
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
PostQuitMessage
CharNextA
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
IsWindowEnabled
ShowWindow
SetWindowTextA
IsDialogMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
EnableWindow
CharUpperA
UnregisterClassA
DrawIcon
AppendMenuA
SendMessageA
GetSystemMenu
IsIconic
GetWindowRect
GetClientRect
ScreenToClient
SetCursor
SetTimer
GetMessagePos
PeekMessageA
MapWindowPoints
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
GetDlgCtrlID
RegisterWindowMessageA
SetCapture
KillTimer
LoadIconA
GetSystemMetrics
GetCursorPos
CallNextHookEx
UnhookWindowsHookEx
MoveWindow
GetDesktopWindow
GetParent
MessageBoxA
SetWindowsHookExA
PostMessageA
RedrawWindow
GetNextDlgTabItem
GetSysColor
GetKeyState
EnableMenuItem
GetWindow
PtInRect
CopyRect
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
GetWindowLongA
CallWindowProcA
DefWindowProcA
gdi32
GetRgnBox
GetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteDC
DeleteObject
RestoreDC
SaveDC
ExtTextOutA
CreateRectRgnIndirect
GetTextColor
GetBkColor
GetStockObject
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
SetMapMode
comdlg32
ChooseFontA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHCreateDirectoryExA
comctl32
ord17
ImageList_Destroy
shlwapi
PathAppendA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CoTaskMemFree
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
OleCreateFontIndirect
SysFreeString
SysStringLen
SysAllocStringByteLen
SafeArrayDestroy
SysAllocString
VariantCopy
SystemTimeToVariantTime
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ