EPSDNLMW32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_2cfe4c6b0b03b3dcfc3a08f757709d59_hijackloader_icedid.exe
Resource
win7-20240903-en
General
-
Target
2024-10-02_2cfe4c6b0b03b3dcfc3a08f757709d59_hijackloader_icedid
-
Size
1.9MB
-
MD5
2cfe4c6b0b03b3dcfc3a08f757709d59
-
SHA1
028e86173648a2afb9abf25b32bbf7abe598d387
-
SHA256
4ee24c38e967d758748c2c1d419673420ba68ccc2ad366c876c20e7ffb26f77f
-
SHA512
94aee00dde5800f207189e8c19b90294a74d20132a93aee5f5193ac73cdb3a59a2377056b2380e7fd35afa86a5bc389bade050fa068b30e01eeef2ca19154e6f
-
SSDEEP
49152:2M/74G5x2qQgxZQcciXhj07qmcjdL3kq6JFhbDEgJWu:Jp2PgxqYXhA7qF5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-02_2cfe4c6b0b03b3dcfc3a08f757709d59_hijackloader_icedid
Files
-
2024-10-02_2cfe4c6b0b03b3dcfc3a08f757709d59_hijackloader_icedid.exe windows:5 windows x86 arch:x86
df1a99578f4823a3c3e7622f9c17d639
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
CreateFileW
SetErrorMode
GetFileSizeEx
GetFileTime
GetStartupInfoW
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
RaiseException
ExitProcess
ExitThread
CreateThread
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
LockFile
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
FlushFileBuffers
InterlockedCompareExchange
GetStringTypeExA
GetMailslotInfo
CreateMailslotW
GetSystemTime
GetExitCodeProcess
DeviceIoControl
CreateProcessW
GetCommTimeouts
SetCommTimeouts
SetFilePointer
WriteFile
ReadFile
GlobalFindAtomW
LoadLibraryA
GetVersionExA
GlobalFlags
GetModuleHandleA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
CompareStringW
InterlockedIncrement
GetThreadLocale
lstrlenA
GetCurrentProcessId
GlobalAddAtomW
WaitForSingleObject
ResumeThread
ReleaseMutex
CreateMutexW
ReleaseSemaphore
CreateSemaphoreW
FreeResource
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
LoadLibraryExW
CompareStringA
InterlockedExchange
FileTimeToLocalFileTime
InterlockedDecrement
FormatMessageW
LocalFree
MulDiv
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
WritePrivateProfileStringW
GetCommandLineW
SetFileAttributesW
DeleteFileW
CreateDirectoryW
SetLastError
GetLastError
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetModuleFileNameW
FindClose
FindFirstFileW
GetCurrentProcess
GetModuleHandleW
WideCharToMultiByte
HeapSize
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalHandle
GlobalUnlock
GlobalAlloc
GlobalLock
Sleep
GetProcAddress
GetVersionExW
lstrcmpW
GetPrivateProfileStringW
MultiByteToWideChar
lstrlenW
GetSystemDirectoryW
FreeLibrary
LoadLibraryW
GetTickCount
GetFileAttributesW
FindResourceW
LoadResource
LockResource
GetCPInfo
SizeofResource
user32
IsIconic
GetWindowPlacement
MessageBeep
IsChild
GetTopWindow
GetNextDlgTabItem
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
GetClientRect
EqualRect
IntersectRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
OffsetRect
CopyRect
CharNextW
SetFocus
ShowWindow
MoveWindow
IsDialogMessageW
SendDlgItemMessageW
GetDlgItem
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
EndPaint
BeginPaint
GetWindowDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetDesktopWindow
ReleaseCapture
GetCapture
SetCapture
SystemParametersInfoA
ClientToScreen
UnregisterClassW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextW
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
IsWindow
GetMenu
LoadStringA
GetWindowLongW
SetWindowLongW
SetWindowPos
wsprintfW
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
SendMessageW
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetWindow
SetWindowContextHelpId
GetParent
MapDialogRect
PostQuitMessage
CallWindowProcW
DefWindowProcW
PostMessageW
UnhookWindowsHookEx
AdjustWindowRectEx
RegisterClassW
GetClassInfoW
GetClassInfoExW
CreateWindowExW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostThreadMessageW
CreateDialogIndirectParamW
EndDialog
RegisterClipboardFormatW
DestroyMenu
CharUpperW
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageA
WinHelpW
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
SetActiveWindow
DestroyWindow
GetMessageTime
UpdateWindow
MapWindowPoints
SetMenu
SetForegroundWindow
LoadCursorW
GetMessagePos
gdi32
DeleteObject
GetObjectW
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
GetPrinterW
GetPrinterDriverW
EnumPortsW
DocumentPropertiesW
OpenPrinterW
XcvDataW
advapi32
RegDeleteKeyW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegOpenKeyExW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
PathStripToRootW
PathIsUNCW
PathFindFileNameW
oledlg
OleUIBusyW
ole32
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromString
CLSIDFromProgID
OleUninitialize
CoFreeUnusedLibraries
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
CoRegisterMessageFilter
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
VariantCopy
VariantChangeType
VariantClear
SysAllocStringLen
SysFreeString
SysStringLen
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
VariantInit
SafeArrayGetElemsize
ws2_32
ntohl
ntohs
htons
inet_addr
select
__WSAFDIsSet
WSAStartup
gethostbyname
inet_ntoa
WSACleanup
WSCEnumProtocols
htonl
closesocket
socket
WSAGetLastError
setsockopt
getsockopt
shutdown
bind
listen
accept
connect
send
recv
sendto
recvfrom
oleacc
CreateStdAccessibleObject
LresultFromObject
winmm
timeGetTime
setupapi
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsW
SetupDiGetDeviceRegistryPropertyW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
rpcrt4
UuidFromStringW
iphlpapi
GetIpAddrTable
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 368KB - Virtual size: 367KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 31KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 210KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE