Analysis
-
max time kernel
153s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2022, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
798KB
-
MD5
f22767b6260d5c30146637eb8bb602c8
-
SHA1
f9172f701a0c3957af1801e25951d6cd154e67ec
-
SHA256
8982e072b2b380555b308d7180ee08b36e524907668b0f6f98f9136bbe93ac13
-
SHA512
749174038409ad519527ae2f29200a1cc9a0ddd6d767e7d15f43053e9e6bb33578bce8739305aaf1e26ef34de1a0afb914bbe19a9a0ea6fc8036a8bee714da9b
-
SSDEEP
3072:lahKyd2n3165U1SXdkLPdf/RVJzKEANr8qkCr:lahO7IsRVJz0rO
Malware Config
Extracted
icexloader
http://stealthelite.one/magnumopus/Script.php
Signatures
-
Detects IceXLoader v3.0 4 IoCs
resource yara_rule behavioral2/memory/820-146-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/820-149-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/820-150-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/820-151-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 -
icexloader
IceXLoader is a downloader used to deliver other malware families.
-
Executes dropped EXE 2 IoCs
pid Process 4504 SETUP_~1.EXE 820 SETUP_~1.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation SETUP_~1.EXE -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Opus.exe SETUP_~1.EXE -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Opus = "\"C:\\Users\\Admin\\AppData\\Roaming\\Opus.exe\"" SETUP_~1.EXE Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run SETUP_~1.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Opus = "\"C:\\Users\\Admin\\AppData\\Roaming\\Opus.exe\"" SETUP_~1.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run SETUP_~1.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4504 set thread context of 820 4504 SETUP_~1.EXE 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1884 powershell.exe 1884 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4504 SETUP_~1.EXE Token: SeDebugPrivilege 1884 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2164 wrote to memory of 4504 2164 file.exe 82 PID 2164 wrote to memory of 4504 2164 file.exe 82 PID 2164 wrote to memory of 4504 2164 file.exe 82 PID 4504 wrote to memory of 1884 4504 SETUP_~1.EXE 83 PID 4504 wrote to memory of 1884 4504 SETUP_~1.EXE 83 PID 4504 wrote to memory of 1884 4504 SETUP_~1.EXE 83 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91 PID 4504 wrote to memory of 820 4504 SETUP_~1.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA2AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
PID:820
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334.1MB
MD5e40665abba2787f3721ce00532ee17db
SHA1dd9cd11aaa778e5e3b0810c90c659804425f0d0d
SHA256f80d7f5e6551b8e5be0f6c857a879fbc72c9c6290bfb28bd8127e3c8c947a44d
SHA512060d18ed8cf474f7a2c2f53647a6c36517ac620a1e80c3d19e62260cbb78a7cae1e27e6a93feb15109d115c5bba334386ff90703fa176a491f016070e6e7801c
-
Filesize
334.1MB
MD5e40665abba2787f3721ce00532ee17db
SHA1dd9cd11aaa778e5e3b0810c90c659804425f0d0d
SHA256f80d7f5e6551b8e5be0f6c857a879fbc72c9c6290bfb28bd8127e3c8c947a44d
SHA512060d18ed8cf474f7a2c2f53647a6c36517ac620a1e80c3d19e62260cbb78a7cae1e27e6a93feb15109d115c5bba334386ff90703fa176a491f016070e6e7801c
-
Filesize
283.8MB
MD5ac42afd8aee2793467ee214a6025bc3d
SHA1cdafe82ab17d981cf29f111dd24a8aec5d1f747f
SHA25698359762ef9827a08292ab3ae66c9af1855c8f11ce376940d861ee2b5db3725d
SHA51224160915bb7a97bdf667f2808b562f7ebf64252454d31f8a27648b9f1a39b10620f26bef1b90e0e2502d20003f23fd33091d4a3697ef7db01bf4498cf7370095