Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 20:52
Static task
static1
Behavioral task
behavioral1
Sample
ICARUS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ICARUS.exe
Resource
win10v2004-20240226-en
General
-
Target
ICARUS.exe
-
Size
8.5MB
-
MD5
e6a620574c5dc9ce58e154d70c1d9554
-
SHA1
8393b760d657ab39d92a43070d75be25c315b8c9
-
SHA256
e7a1e22275898facd79c2dd59f2be158317ae44cb7eb661a3b7e0f351f0c8a4c
-
SHA512
5b4deaad005c9145dbda58859ea5063e081339c6fe5c21069c0eedaf0bac1fbda501bd5c10b13b8c7e4c860a5456f8f03c5bc95cda1a6094b215eada542522ce
-
SSDEEP
196608:aCkRUlCbTlSndgMimOXNsCDC4PfcPsRV:aCkqlCsdgvXyQC4
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll elysiumstealer_dll -
Loads dropped DLL 1 IoCs
Processes:
ICARUS.exepid process 924 ICARUS.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
taskmgr.exepid process 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 1048 taskmgr.exe Token: SeSystemProfilePrivilege 1048 taskmgr.exe Token: SeCreateGlobalPrivilege 1048 taskmgr.exe Token: 33 1048 taskmgr.exe Token: SeIncBasePriorityPrivilege 1048 taskmgr.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
Processes:
taskmgr.exepid process 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe -
Suspicious use of SendNotifyMessage 46 IoCs
Processes:
taskmgr.exepid process 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe 1048 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ICARUS.exe"C:\Users\Admin\AppData\Local\Temp\ICARUS.exe"1⤵
- Loads dropped DLL
PID:924
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD594173de2e35aa8d621fc1c4f54b2a082
SHA1fbb2266ee47f88462560f0370edb329554cd5869
SHA2567e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798