Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_053223d11cefd8a1892a4b5cf1934180_icedid.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-28_053223d11cefd8a1892a4b5cf1934180_icedid.exe
Resource
win10v2004-20240802-en
Target
2024-09-28_053223d11cefd8a1892a4b5cf1934180_icedid
Size
9.1MB
MD5
053223d11cefd8a1892a4b5cf1934180
SHA1
7ade572b7cf24fb834744d8ecdcc698c0d0e220e
SHA256
9e2721b79d1166aaa4c27395e37a7cd0e9b8df231772aa9f2decf88cf63866b5
SHA512
bbb8ac59dccccd236df05e69a8ff50bb58135765aa58e55181a1362b03f47ac10f3f471fd372bd6d0d232390d3de8bd9a3645a490d83d4d41d10cb3cdf1d2b58
SSDEEP
196608:PvYtaSiE/5hNpHwAVtNCkdp4zRiUMDBH+UggJ6M8YY4:iiE/5hbVt8kdpMRiUMDBHL78YY4
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
mmioRead
PlaySoundA
mmioAscend
mmioClose
mmioOpenA
mciSendStringA
mmioDescend
EnumProcesses
GetModuleFileNameExA
FindResourceExA
LoadLibraryW
GetSystemDirectoryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapReAlloc
RtlUnwind
RaiseException
VirtualAlloc
VirtualQuery
ExitThread
CreateThread
SetStdHandle
GetFileType
HeapSize
GlobalHandle
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
GetStdHandle
GetConsoleCP
GetConsoleMode
SetHandleCount
InitializeCriticalSectionAndSpinCount
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GlobalReAlloc
TlsGetValue
GetModuleHandleW
GetFileSizeEx
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
GetFileAttributesExA
VirtualProtect
ConvertDefaultLocale
EnumResourceLanguagesA
LoadLibraryExA
InterlockedExchange
lstrcmpA
GetUserDefaultLCID
GetModuleFileNameW
SuspendThread
GetFullPathNameA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GetStringTypeExA
FileTimeToLocalFileTime
FindNextFileA
FreeResource
WritePrivateProfileStringA
SetErrorMode
GetOEMCP
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
CompareStringA
lstrcmpW
lstrlenA
SetThreadPriority
GetThreadPriority
GetDiskFreeSpaceExA
GetVolumeInformationA
DeviceIoControl
GetVolumePathNameA
TerminateProcess
GetProcessId
OpenProcess
FileTimeToSystemTime
GetTimeZoneInformation
LocalAlloc
ResetEvent
GetFileTime
CreateFileA
GetCurrentProcess
GetNumberFormatA
GetCurrentDirectoryA
CreateProcessA
GetExitCodeProcess
GetFileAttributesA
GetCurrentThread
GlobalUnlock
GlobalLock
QueryPerformanceFrequency
QueryPerformanceCounter
SystemTimeToFileTime
GetTimeFormatA
GetDateFormatA
GetVersion
GetSystemInfo
CreateEventA
SetEvent
GetTempPathA
GetTempFileNameA
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
Beep
ExitProcess
GetSystemTimeAsFileTime
GetWindowsDirectoryA
CloseHandle
HeapFree
GetProcessHeap
HeapAlloc
MoveFileA
OutputDebugStringA
GlobalAlloc
FindClose
FindFirstFileA
CreateDirectoryA
GetLocaleInfoA
GetCurrentThreadId
ResumeThread
MulDiv
GetCurrentProcessId
GetVersionExA
FreeLibrary
WaitForMultipleObjects
TerminateThread
ExpandEnvironmentStringsA
MultiByteToWideChar
GetProcAddress
LoadLibraryA
SetLastError
lstrcpynA
GetModuleHandleA
RemoveDirectoryA
InterlockedDecrement
InterlockedIncrement
IsBadWritePtr
GetLastError
GetTickCount
CopyFileA
GetModuleFileNameA
DeleteFileA
GlobalFree
Sleep
LocalFree
FormatMessageA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
TlsSetValue
TlsAlloc
InterlockedCompareExchange
GetACP
DrawTextExA
TabbedTextOutA
MapDialogRect
MoveWindow
GetMenuCheckMarkDimensions
GetMessageA
TranslateMessage
ValidateRect
CharUpperA
CreateDialogIndirectParamA
EndDialog
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextLengthA
GetWindowTextA
GetLastActivePopup
DispatchMessageA
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
MapWindowPoints
SetMenu
SetScrollPos
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
DeferWindowPos
SetWindowPlacement
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
IntersectRect
GetWindowPlacement
GetMenuStringA
DrawStateA
ShowWindow
GetSysColorBrush
CopyImage
DrawFocusRect
GetMenuBarInfo
SendInput
GetWindowDC
SetWindowTextA
CloseClipboard
SetClipboardData
OpenClipboard
SetMenuItemBitmaps
TrackPopupMenu
PostThreadMessageA
UnregisterHotKey
RegisterHotKey
IsZoomed
GetDoubleClickTime
DrawIcon
PostQuitMessage
GetActiveWindow
FindWindowA
GetClassInfoA
EnumDisplaySettingsA
CopyIcon
GetMessagePos
EnumChildWindows
GetMenuItemInfoA
GetKeyNameTextA
MapVirtualKeyA
GetIconInfo
CreateIconIndirect
DrawTextA
RegisterWindowMessageA
CreateMenu
UnionRect
WindowFromPoint
CreateWindowExA
LoadIconA
DrawMenuBar
EqualRect
AllowSetForegroundWindow
SetActiveWindow
GetWindowThreadProcessId
IsWindowEnabled
BringWindowToTop
GetMenu
SetFocus
FindWindowExA
IsChild
IsDialogMessageA
DrawEdge
InflateRect
PeekMessageA
SetForegroundWindow
MonitorFromPoint
GetDesktopWindow
OffsetRect
GetWindow
SetWindowPos
GetDlgCtrlID
HideCaret
SetCursor
LoadCursorA
IsIconic
IsWindowVisible
GetDlgItem
SetMenuDefaultItem
EnableMenuItem
LoadMenuA
GetSubMenu
ModifyMenuA
BeginPaint
EndPaint
DestroyMenu
SetRect
CharNextA
SetWindowContextHelpId
RegisterClipboardFormatA
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
RemoveMenu
InsertMenuA
ScreenToClient
LoadBitmapA
MessageBeep
keybd_event
UnregisterClassA
FillRect
LoadImageA
GetKeyState
GetForegroundWindow
GetNextDlgTabItem
GetFocus
ReleaseDC
GetDC
UpdateWindow
ChildWindowFromPointEx
ChildWindowFromPoint
ReleaseCapture
SetCapture
GetCursorPos
CheckMenuItem
DeleteMenu
AppendMenuA
GetMenuItemID
ClientToScreen
PtInRect
IsRectEmpty
DrawFrameControl
CreatePopupMenu
SetRectEmpty
GetMenuItemCount
CopyRect
GetMonitorInfoA
MonitorFromRect
GetSystemMetrics
SystemParametersInfoA
GetClientRect
GetWindowRect
RedrawWindow
TranslateAcceleratorA
GetParent
DestroyAcceleratorTable
CreateAcceleratorTableA
EnableWindow
InvalidateRect
DestroyIcon
GetAsyncKeyState
IsWindow
PostMessageA
KillTimer
SetTimer
MessageBoxA
GetSysColor
SendMessageA
GetMenuState
LoadStringA
EmptyClipboard
GrayStringA
ExtSelectClipRgn
GetMapMode
DPtoLP
GetCharWidthA
StretchDIBits
GetBkColor
GetRgnBox
RestoreDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
IntersectClipRect
SetBkMode
SelectObject
CreateFontIndirectA
ExcludeClipRect
GetObjectA
DeleteObject
SaveDC
CreateRectRgnIndirect
SetBkColor
GetClipBox
GetPixel
GetTextColor
SetBitmapBits
GetBitmapBits
GetDIBits
SetTextColor
RoundRect
CreateBitmap
GetTextCharset
GetTextMetricsA
EnumFontFamiliesExA
CreateFontA
EndDoc
EndPage
StartPage
StartDocA
SetMapMode
DeleteDC
GetDeviceCaps
GetTextExtentPoint32A
CreateCompatibleBitmap
StretchBlt
CreateCompatibleDC
Polygon
Rectangle
CreatePen
CreateSolidBrush
GetStockObject
SetPixel
SetStretchBltMode
TransparentBlt
GetFileTitleA
FindTextA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
CryptAcquireContextA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegCloseKey
RegQueryValueA
RegOpenKeyA
CryptReleaseContext
CryptDestroyKey
CryptDecrypt
CryptEncrypt
CryptGetKeyParam
CryptSetKeyParam
CryptImportKey
CryptDestroyHash
RegEnumValueA
AccessCheck
MapGenericMask
OpenThreadToken
ImpersonateSelf
GetFileSecurityA
RegOpenKeyExA
SHBrowseForFolderA
SHFileOperationA
ExtractIconExA
DragQueryFileA
SHChangeNotify
DragQueryPoint
Shell_NotifyIconA
SHGetFolderPathA
ShellExecuteA
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
_TrackMouseEvent
ord17
ord8
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
PathRemoveFileSpecW
PathStripToRootA
UrlUnescapeA
ord8
CoUninitialize
StgCreateDocfile
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoInitializeEx
CLSIDFromProgID
CLSIDFromString
CoDisconnectObject
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoInitialize
SystemTimeToVariantTime
LoadTypeLi
SafeArrayDestroy
OleCreateFontIndirect
SysFreeString
SysAllocStringLen
VariantInit
SysStringLen
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantCopy
SysAllocString
VariantTimeToSystemTime
WSACleanup
WSAStartup
WSASetLastError
gethostbyname
WSAGetLastError
htons
socket
connect
closesocket
send
recv
setsockopt
shutdown
select
GdiplusShutdown
GdiplusStartup
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipLoadImageFromFile
GdipDrawImageRectI
GdipSetInterpolationMode
GdipSetCompositingQuality
GdipSetCompositingMode
GdipAlloc
GdipDeleteGraphics
GdipCreateFromHDC
GdipDisposeImage
GdipFree
HttpSendHttpResponse
HttpCreateHttpHandle
HttpAddUrl
HttpReceiveHttpRequest
HttpTerminate
HttpRemoveUrl
HttpInitialize
CryptMsgClose
CertCloseStore
CertGetNameStringA
CryptQueryObject
CryptMsgGetParam
CertFindCertificateInStore
CertFreeCertificateContext
CertOpenSystemStoreA
CertEnumCertificatesInStore
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
WinVerifyTrust
GetAdaptersInfo
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetReadFile
HttpSendRequestA
InternetGetLastResponseInfoA
HttpQueryInfoA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetQueryOptionA
InternetDial
InternetCloseHandle
InternetSetOptionA
InternetGetConnectedState
InternetAutodialHangup
InternetAutodial
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ