C:\vmagent_new\bin\joblist\562952\out\Release\360AppLoader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-30_7f2848fcb8a551429c34cdf932bed1e7_icedid.exe
Resource
win7-20240729-en
General
-
Target
2024-12-30_7f2848fcb8a551429c34cdf932bed1e7_icedid
-
Size
516KB
-
MD5
7f2848fcb8a551429c34cdf932bed1e7
-
SHA1
a5cf943257807137bf9cbb2a8329552367b03bdd
-
SHA256
e483d25a1d3db8688ed5a6c1c7a4c8259da1814dafc7c2a0e9df5cb18db46824
-
SHA512
37055e57a504b3c5dbd93333f6d0e75fca4982b26f4144013fe083d185cead6e9fe44b589660c83bc96d9485255009547d3fa57c1ef256dabc009040b1af38c5
-
SSDEEP
12288:GjFRIX8qDmc1N/8QsNDhqiB177Fn8s8tzAp6HY7Ra/++Naw/HCdaw9VV:SFCNmcrXsNVR7Fn/8tzu3FM++swdw9f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-12-30_7f2848fcb8a551429c34cdf932bed1e7_icedid
Files
-
2024-12-30_7f2848fcb8a551429c34cdf932bed1e7_icedid.exe windows:5 windows x86 arch:x86
e32fde3fb7a568246d446b79022df6e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
SetErrorMode
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetFileAttributesW
GetFileSizeEx
GetFileTime
GetTickCount
GetStartupInfoW
HeapAlloc
HeapFree
RtlUnwind
ExitThread
CreateThread
RaiseException
UnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
HeapSize
GetSystemInfo
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
GetFileSize
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetProcessHeap
SetEnvironmentVariableA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
ReleaseMutex
HeapWalk
HeapLock
OpenThread
HeapUnlock
SetFilePointerEx
SetFilePointer
WriteFile
ReadFile
SystemTimeToFileTime
FileTimeToSystemTime
GetThreadLocale
GlobalFlags
WritePrivateProfileStringW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GetModuleHandleA
WaitForSingleObject
FreeResource
GlobalAddAtomW
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GlobalDeleteAtom
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
MulDiv
SetLastError
VirtualAlloc
VirtualQuery
GetCurrentThread
OutputDebugStringW
GetCurrentThreadId
GetCurrentProcess
VirtualProtect
GetVersionExW
GetWindowsDirectoryW
lstrlenW
SetUnhandledExceptionFilter
OpenProcess
TerminateProcess
GetCommandLineW
FindNextFileW
FindFirstFileW
FindClose
GetTempPathW
GetTempFileNameW
DeleteFileW
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
lstrlenA
MultiByteToWideChar
CreateMutexW
Sleep
ExitProcess
DeleteCriticalSection
FreeLibrary
InitializeCriticalSection
InterlockedIncrement
LoadLibraryW
GlobalAlloc
GlobalFree
WideCharToMultiByte
FindResourceW
LoadResource
LockResource
SizeofResource
GetLastError
GetModuleHandleW
GetModuleFileNameW
GetProcAddress
LoadLibraryExW
GetCurrentProcessId
CreateFileW
DeviceIoControl
VirtualFree
CloseHandle
user32
GetNextDlgTabItem
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
CharUpperW
UnregisterClassW
ReleaseCapture
SetCapture
GetDesktopWindow
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetDC
ReleaseDC
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetWindowThreadProcessId
SetCursor
GetMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
MessageBeep
SetPropW
GetPropW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
UpdateWindow
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
EqualRect
SetForegroundWindow
BringWindowToTop
ShowWindow
IsIconic
CallWindowProcW
CopyRect
PtInRect
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextW
GetFocus
GetParent
PostThreadMessageW
RegisterClipboardFormatW
CreateDialogIndirectParamW
EndDialog
GetClassNameW
FindWindowW
SendMessageW
IsWindow
GetClientRect
PostMessageW
RemovePropW
MessageBoxW
GetActiveWindow
InflateRect
DrawIcon
AppendMenuW
GetSystemMenu
LoadIconW
GetSystemMetrics
EnableWindow
MoveWindow
GetDlgItem
LoadImageW
CreateWindowExW
IsWindowVisible
wsprintfW
LoadCursorW
DefWindowProcW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
UnhookWindowsHookEx
GetWindow
SetWindowPos
SetFocus
IsWindowEnabled
SetWindowLongW
GetDlgCtrlID
SetWindowTextW
GetWindowLongW
IsDialogMessageW
SendDlgItemMessageW
TranslateMessage
gdi32
ExtSelectClipRgn
DeleteDC
GetStockObject
GetBkColor
GetTextColor
GetRgnBox
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
GetWindowExtEx
SetMapMode
RestoreDC
SaveDC
DeleteObject
GetMapMode
CreateRectRgnIndirect
ExtTextOutW
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
ScaleWindowExtEx
GetViewportExtEx
GetDeviceCaps
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegOpenKeyW
RegQueryValueExA
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegEnumKeyExW
RegEnumKeyW
RegDeleteKeyW
OpenProcessToken
GetTokenInformation
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteW
ShellExecuteExW
comctl32
ord17
shlwapi
PathFindFileNameW
SHGetValueW
PathFileExistsW
PathAddBackslashW
PathCombineW
PathRemoveFileSpecW
PathAppendW
StrCmpNIW
StrStrIW
PathFindExtensionW
PathStripToRootW
PathIsRelativeW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromProgID
OleInitialize
CoTaskMemAlloc
OleUninitialize
CLSIDFromString
CoFreeUnusedLibraries
CoRevokeClassObject
OleIsCurrentClipboard
CoTaskMemFree
CoInitialize
CoUninitialize
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocString
SysStringLen
VariantInit
VariantClear
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
VariantChangeType
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysFreeString
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 305KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 18KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE