Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/10/2022, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
603KB
-
MD5
cb90f4dd9eb3424268b20a1581668acd
-
SHA1
136a226e0f56c7bf53822ab116ea4304b8a636e6
-
SHA256
49d6552ae5c5027ce1e68edee2438564b50ddc384276fd97360c92503771d3ac
-
SHA512
43ef96a52dfe7018d7fd9315c428fb1b368e92357585f57bd405260d5e5d9f498e423d0a3d5de1ef300983f3f7b42bd7a2f2217ca5d74b88c4533021086c19a4
-
SSDEEP
3072:QahKyd2n3165+HAsZsJBh6aH1wQwpSbr:QahOpqhvSn
Malware Config
Extracted
icexloader
http://stealthelite.one/magnumopus/Script.php
Signatures
-
Detects IceXLoader v3.0 6 IoCs
resource yara_rule behavioral2/memory/4252-146-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/4252-149-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/4252-150-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/4252-153-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/2840-168-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 behavioral2/memory/2840-181-0x0000000000400000-0x0000000000451000-memory.dmp family_icexloader_v3 -
icexloader
IceXLoader is a downloader used to deliver other malware families.
-
Executes dropped EXE 4 IoCs
pid Process 972 STOREM~2.EXE 4252 STOREM~2.EXE 1604 Opus.exe 2840 Opus.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation STOREM~2.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Opus.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Opus.exe STOREM~2.EXE -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run STOREM~2.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Opus = "\"C:\\Users\\Admin\\AppData\\Roaming\\Opus.exe\"" STOREM~2.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run STOREM~2.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Opus = "\"C:\\Users\\Admin\\AppData\\Roaming\\Opus.exe\"" STOREM~2.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 972 set thread context of 4252 972 STOREM~2.EXE 92 PID 1604 set thread context of 2840 1604 Opus.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
pid Process 2272 timeout.exe 3428 timeout.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1396 powershell.exe 1396 powershell.exe 808 powershell.exe 808 powershell.exe 3732 powershell.exe 3732 powershell.exe 1004 powershell.exe 1004 powershell.exe 2276 powershell.exe 2276 powershell.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 972 STOREM~2.EXE Token: SeDebugPrivilege 1396 powershell.exe Token: SeDebugPrivilege 1604 Opus.exe Token: SeDebugPrivilege 808 powershell.exe Token: SeDebugPrivilege 3732 powershell.exe Token: SeRemoteShutdownPrivilege 2840 Opus.exe Token: SeRemoteShutdownPrivilege 2840 Opus.exe Token: SeRemoteShutdownPrivilege 2840 Opus.exe Token: SeRemoteShutdownPrivilege 2840 Opus.exe Token: SeRemoteShutdownPrivilege 2840 Opus.exe Token: SeRemoteShutdownPrivilege 2840 Opus.exe Token: SeRemoteShutdownPrivilege 2840 Opus.exe Token: SeRemoteShutdownPrivilege 2840 Opus.exe Token: SeRemoteShutdownPrivilege 2840 Opus.exe Token: SeRemoteShutdownPrivilege 2840 Opus.exe Token: SeDebugPrivilege 1004 powershell.exe Token: SeDebugPrivilege 2276 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 972 5000 file.exe 82 PID 5000 wrote to memory of 972 5000 file.exe 82 PID 5000 wrote to memory of 972 5000 file.exe 82 PID 972 wrote to memory of 1396 972 STOREM~2.EXE 88 PID 972 wrote to memory of 1396 972 STOREM~2.EXE 88 PID 972 wrote to memory of 1396 972 STOREM~2.EXE 88 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 972 wrote to memory of 4252 972 STOREM~2.EXE 92 PID 4252 wrote to memory of 1988 4252 STOREM~2.EXE 93 PID 4252 wrote to memory of 1988 4252 STOREM~2.EXE 93 PID 4252 wrote to memory of 1988 4252 STOREM~2.EXE 93 PID 4252 wrote to memory of 4120 4252 STOREM~2.EXE 94 PID 4252 wrote to memory of 4120 4252 STOREM~2.EXE 94 PID 4252 wrote to memory of 4120 4252 STOREM~2.EXE 94 PID 1988 wrote to memory of 3428 1988 cmd.exe 98 PID 1988 wrote to memory of 3428 1988 cmd.exe 98 PID 1988 wrote to memory of 3428 1988 cmd.exe 98 PID 4120 wrote to memory of 2272 4120 cmd.exe 97 PID 4120 wrote to memory of 2272 4120 cmd.exe 97 PID 4120 wrote to memory of 2272 4120 cmd.exe 97 PID 1988 wrote to memory of 1604 1988 cmd.exe 99 PID 1988 wrote to memory of 1604 1988 cmd.exe 99 PID 1988 wrote to memory of 1604 1988 cmd.exe 99 PID 1604 wrote to memory of 808 1604 Opus.exe 100 PID 1604 wrote to memory of 808 1604 Opus.exe 100 PID 1604 wrote to memory of 808 1604 Opus.exe 100 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102 PID 1604 wrote to memory of 2840 1604 Opus.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXE2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXE3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\cmd.execmd /c timeout 2 & "C:\Users\Admin\AppData\Roaming\Opus.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:3428
-
-
C:\Users\Admin\AppData\Roaming\Opus.exe"C:\Users\Admin\AppData\Roaming\Opus.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Users\Admin\AppData\Roaming\Opus.exeC:\Users\Admin\AppData\Roaming\Opus.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"7⤵PID:1280
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-MpPreference -DisableRealtimeMonitoring $true8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionExtension "C:\Users\Admin\AppData\Roaming\Opus\.exe"8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin"8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c timeout 1 & del /F "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\STOREM~2.EXE"4⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\timeout.exetimeout 15⤵
- Delays execution with timeout.exe
PID:2272
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5369e68998feb323fc408b7092d5e6567
SHA1eb1f8f403d6cf4f014379dfdb93b64dc4eae410b
SHA256ffb4bfa8295e76f06c9f305d0bb10353bea91f657cb0b7b78e4459505168298b
SHA512e51a73d5a64e554d662f44a087d94af09bf1e4c142fad3a8d2bee8c087fe3642edd7172ee71541ad9e9afe9507bf4308f4ccd694c8bb36b475e2f3211b0392ef
-
Filesize
15KB
MD5702d3f32677eb4b4a34783f6db014f11
SHA112513956ad7eb34d1a054b360bd5ca6fd4591685
SHA256db29c5476fdc368dcb9ad47d2e1114275688a928ef790ae04a9cbe90b0a4a7b6
SHA512c82b0d7e7a3c702e01d6d55e7bd34b97e6af51f12eac0ba18221186518469b9f69529a3e10c963c112bfa783f2f4155f78ad25555636364df632616f1867b593
-
Filesize
18KB
MD5574503dcf374dabe5caf032222870d20
SHA194dd55ca2042c447b3eb183075cb47f20763557a
SHA256116e2f118c59576ba00801a5458177cd349c6a65ea29fdc611cf94cb25439290
SHA5128e4ea2463d864e0153f4aac14cd87dcf420b9c403007343d7860b16e645dec41991923f8afcdcedaf8aee75cdb19454c352562ffefe344ab8a1e44a8862e2095
-
Filesize
18KB
MD54021c29562ba81c3f494f72363233dbc
SHA12b09f643180e40858c4a6f93688e551beca093b4
SHA2569d9ad98632209e113bdcd33fe797dccb392c24859f4fd09d2384448a2a61b63c
SHA5125136d27f87331bc43637f081fb5ffe0ac4ed9a7de9fe68723c0d0224c448cfcb0e5a03b8d62d36e8a070398beda2a338529d23868994927a909b37350118f386
-
Filesize
343.3MB
MD50ba3f7a23e80b0421bc417a03d879f39
SHA15b4e28240a57e7c6a8ce15888df1c495910fe4f4
SHA2567bb69f98d77ca7609c10b9a0ab1ce32be2e26b160413203d5335f65c1bc8ee72
SHA51209c00bb95358bdbfd94d386b417513d50bee4e2f5da61a20f60fc1e4e554abd47a38d347c07a85c10bb97b9698b2e3bbcc331790f24076e51dc79e71339164ed
-
Filesize
343.3MB
MD50ba3f7a23e80b0421bc417a03d879f39
SHA15b4e28240a57e7c6a8ce15888df1c495910fe4f4
SHA2567bb69f98d77ca7609c10b9a0ab1ce32be2e26b160413203d5335f65c1bc8ee72
SHA51209c00bb95358bdbfd94d386b417513d50bee4e2f5da61a20f60fc1e4e554abd47a38d347c07a85c10bb97b9698b2e3bbcc331790f24076e51dc79e71339164ed
-
Filesize
343.3MB
MD50ba3f7a23e80b0421bc417a03d879f39
SHA15b4e28240a57e7c6a8ce15888df1c495910fe4f4
SHA2567bb69f98d77ca7609c10b9a0ab1ce32be2e26b160413203d5335f65c1bc8ee72
SHA51209c00bb95358bdbfd94d386b417513d50bee4e2f5da61a20f60fc1e4e554abd47a38d347c07a85c10bb97b9698b2e3bbcc331790f24076e51dc79e71339164ed
-
Filesize
238B
MD5fdb5554346e7388c6bc358c16c448995
SHA117957bbe381d434574e1fc15ed5c74084fda26fe
SHA256898bc3e85e09e353a36612b5911aa2636c06a94443dbec4e62c6b8cf2412640c
SHA5123eec1e0dab21861bcb73cbfe3ea7234768443dd02c62a55919ad7e693501ff886946d74a8f75b7f580fa5251472a13ff55d187396c8d65fe9c2220f2f6da0674
-
Filesize
343.3MB
MD50ba3f7a23e80b0421bc417a03d879f39
SHA15b4e28240a57e7c6a8ce15888df1c495910fe4f4
SHA2567bb69f98d77ca7609c10b9a0ab1ce32be2e26b160413203d5335f65c1bc8ee72
SHA51209c00bb95358bdbfd94d386b417513d50bee4e2f5da61a20f60fc1e4e554abd47a38d347c07a85c10bb97b9698b2e3bbcc331790f24076e51dc79e71339164ed
-
Filesize
343.3MB
MD50ba3f7a23e80b0421bc417a03d879f39
SHA15b4e28240a57e7c6a8ce15888df1c495910fe4f4
SHA2567bb69f98d77ca7609c10b9a0ab1ce32be2e26b160413203d5335f65c1bc8ee72
SHA51209c00bb95358bdbfd94d386b417513d50bee4e2f5da61a20f60fc1e4e554abd47a38d347c07a85c10bb97b9698b2e3bbcc331790f24076e51dc79e71339164ed
-
Filesize
343.3MB
MD50ba3f7a23e80b0421bc417a03d879f39
SHA15b4e28240a57e7c6a8ce15888df1c495910fe4f4
SHA2567bb69f98d77ca7609c10b9a0ab1ce32be2e26b160413203d5335f65c1bc8ee72
SHA51209c00bb95358bdbfd94d386b417513d50bee4e2f5da61a20f60fc1e4e554abd47a38d347c07a85c10bb97b9698b2e3bbcc331790f24076e51dc79e71339164ed