Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe
-
Size
1.4MB
-
MD5
faca38a409a749a617212d1577af4c20
-
SHA1
b39eff37a47cc9fad3b462cefaec6e5455793904
-
SHA256
3dbcc6333a1725aba5b2a5f26380295478d5668c190efaa176e8b41e47785b48
-
SHA512
665f556733385a3b451c458b4125c219ca27b16435238c9d1c1a8102c211b3000330b1fcbd126ebc2d211db382d6083793725085095c6f0b68b70f348a315357
-
SSDEEP
24576:iqM0QHRzf+BooooEJ8GYgqGneBPuzBCxxAih0lhSMXlhe94e4HCkAYtNF:K0Oz2BooooEJsgmPmBCxG/k2e4TAYtD
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2556 icarus.exe 2180 icarus_ui.exe 1484 icarus.exe -
Loads dropped DLL 6 IoCs
pid Process 3024 2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe 2556 icarus.exe 2556 icarus.exe 2556 icarus.exe 2556 icarus.exe 1484 icarus.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe File opened for modification \??\PhysicalDrive0 icarus.exe File opened for modification \??\PhysicalDrive0 icarus.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus_ui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus_ui.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString icarus.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "1298d895-7679-4842-ac79-46365d5b7494" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAA1XFK3kL7+kmHEuPqaFx9CQQAAAACAAAAAAAQZgAAAAEAACAAAABAp+/1AgfIs2vdBhtUsQSLEvFStDBo6ycSyyxeo3aouQAAAAAOgAAAAAIAACAAAAAyp0kXRehOohzI4C31aif+0kqiJNnBeAX/rtlodMXxg2AAAADRbOkaKLVODvN/uqgP6iw/v4+Ou6OCN5a8TbT9GptcEQLwV7fxChQEuVLRZhSR9rTvXWtYL8HgwKM3TxrE82XJlxHNmrMRNDA1SkWWinecVr9xwlRoEjYMfdUqC7GfJtFAAAAABBRm2KpheBxZ8hzmoCQvD9qr1YKtnr5jxE4lrbs65UqsYUT31kOyvrFIh++237TR8sANyu2zkU03FSzdHLXPHw==" icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "1298d895-7679-4842-ac79-46365d5b7494" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" icarus.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2180 icarus_ui.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2556 icarus.exe Token: SeDebugPrivilege 2180 icarus_ui.exe Token: SeDebugPrivilege 1484 icarus.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3024 2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe 2180 icarus_ui.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 icarus_ui.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2556 3024 2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe 28 PID 3024 wrote to memory of 2556 3024 2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe 28 PID 3024 wrote to memory of 2556 3024 2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe 28 PID 3024 wrote to memory of 2556 3024 2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe 28 PID 2556 wrote to memory of 2180 2556 icarus.exe 29 PID 2556 wrote to memory of 2180 2556 icarus.exe 29 PID 2556 wrote to memory of 2180 2556 icarus.exe 29 PID 2556 wrote to memory of 1484 2556 icarus.exe 30 PID 2556 wrote to memory of 1484 2556 icarus.exe 30 PID 2556 wrote to memory of 1484 2556 icarus.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_faca38a409a749a617212d1577af4c20_magniber.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\Temp\asw-88bcb8cd-ac05-470f-ae9c-7a0058f227a5\common\icarus.exeC:\Windows\Temp\asw-88bcb8cd-ac05-470f-ae9c-7a0058f227a5\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-88bcb8cd-ac05-470f-ae9c-7a0058f227a5\icarus-info.xml /install /sssid:30242⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\Temp\asw-88bcb8cd-ac05-470f-ae9c-7a0058f227a5\common\icarus_ui.exeC:\Windows\Temp\asw-88bcb8cd-ac05-470f-ae9c-7a0058f227a5\common\icarus_ui.exe /sssid:3024 /er_master:master_ep_65d5d17f-eae3-4998-9231-0f993d6dea77 /er_ui:ui_ep_b9e9e1bc-9147-4883-807b-67ce9d4fa6343⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
C:\Windows\Temp\asw-88bcb8cd-ac05-470f-ae9c-7a0058f227a5\avg-vpn\icarus.exeC:\Windows\Temp\asw-88bcb8cd-ac05-470f-ae9c-7a0058f227a5\avg-vpn\icarus.exe /sssid:3024 /er_master:master_ep_65d5d17f-eae3-4998-9231-0f993d6dea77 /er_ui:ui_ep_b9e9e1bc-9147-4883-807b-67ce9d4fa634 /er_slave:avg-vpn_slave_ep_463a3de3-39a7-469f-8548-b7b49606e147 /slave:avg-vpn3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD538bf22e4ebc623f537b3ae142553c3a5
SHA1a1564ecf5b21869ffb3f4f9497bd0c5d96725ef9
SHA256b6baa4b3478d6058b42765511eb8990f7487edcf32e04f3d228d5df10dae9ed1
SHA51205d3cf63cfa6a504cb6454752e92bf9b273b3a2e299b65d5d04b584a8d2eb9dd3b59c64e7d1b794c5176d175d46a31e72a8e00423510e3240f77a047ab9e806e
-
Filesize
10KB
MD5961f3d6c855e1144f3642ffe7aa1505a
SHA1850998bf0924b3be98fba0a9721cb9485843990f
SHA2567b5ec42afab317dcecab34cdc093fd3b6f28380daf8741690b8522b1765c9d4f
SHA51217db60a67aa7d81fc24e219304d6c879a51a0ae74059c6aaae08411ec8a7fd075e46b3f0b520b874719b8b09b5ee121e0c21a7fa020faf855beca3c57c53047d
-
Filesize
9KB
MD5910a7359021a8e9187c74a896b37b92b
SHA125d1e390285a729aa9d17c60d7a40e8df925fb5d
SHA256b718aad7a70e522936dccbf4070c096995e5d6d9c77b90b6c5264eab25590df1
SHA512097ec34114b4cda9845232fd885deb8af40b6c98a681cfd18ca71f5d7fa1e5be08d6d374332318535771210ead830c4256797d5fc35e7e07e3b4b6f50c196091
-
Filesize
214B
MD5d6de6577f75a4499fe64be2006979ae5
SHA10c83a2008fa28a97eb4b01d98aeab90a2e4c8e69
SHA25687d882d37f63429088955a59b126f0d44fa728ce60142478004381a3604c9ea9
SHA512cb4b42c07aa2da7857106c92bc6860a29d8a92f00e34f0df54f68c17945982bc01475c83b1a1079543404bb49342fc7cdc41d2ac32d71332439ceb27b5ad1c0c
-
Filesize
64B
MD522417b5d5eb168147f2c237d658a7163
SHA16ae67daf07c0a187f397923ecba497e5ab01ed58
SHA256f1945b77f21bf5b8174bc94d0d69d4446baffd6808185554f8ae541e4254ecb1
SHA512392b79a63b451495cc81877c288c0068d6c159bf0d7ce9ac0cc290128e57a5a1ebe0569dcbab85433448b3c1928be03cf01300ec7ae99573cfc4ef8c4c9b3cb8
-
Filesize
72B
MD5daed9d59e31f4acb47863b8a9373ffe8
SHA146f3e440346896f8794e72d699aa2d96a1941260
SHA25603dbd3c5ab297b863d2b9534c013590dff706be969428f6aba05f60577332448
SHA512d91f60616862764ccbe294e4a4a941f8e88c04b882b340af90ef24cf992355e2423caf99f9947ad61cb5515799499e33bd83bf0d0ec8207003e014667d8ce2c2
-
Filesize
550B
MD50edbccf80fa9d20d5a146c074b64fb27
SHA1f304ed7b04f67c866faf7ace484b1f22fb0506b2
SHA2568fa3ae8916029d1607cc4ffafaf073068702f5ddeee2e3e6d2e283aaf41412eb
SHA51262a1ec0d3950ee06cb1f4f44b5a7e2af0450089e295b3690f4de79aa7d6b2ba53a1ba2c063a579236419a68887a9aa70e121bb82f8fc15211997371dc1709a2e
-
Filesize
962KB
MD52def504900ab97e99cad21ad6e5cc7c4
SHA155c878e53437954fb5828ebb4981458f7ca7e002
SHA256bc25ea6ca68d9660df19bc204dc394af3dc1d27b9766e275765c6edd68456664
SHA5128e9b9029bca807b5b1de4b77714edc9dacc8a1695d31801b3ede5f92116b4ec80090bffcee4aee374ae45dc04e9a60c364204008a6bb3da2b1e9d008602b7af9
-
Filesize
214KB
MD55f7ee8b4e03c4d4bcf3bd69288c033c6
SHA1b0c39074e4fd26a4acea4afba4753946284556fc
SHA2565790b136cd71fecbbf5560fe5cb731a6b763dda5ab0aa28e5a548e760e1e7c5a
SHA512d5b9548fd726c45f94b2a9026956b05e583ba50c41fa22a9a278611f804db2dba8a9a87bac0092d90687e591c2a4756c73b29bcaef7169467de571bc545c5277
-
Filesize
186KB
MD573b65ea51fb95e10c6d663019d4d6d33
SHA1ce2f4bcb4e17f6c66b54594764d43ed61e973f64
SHA2564af8c6f38e464a4798756d16418ba06d97dc9f264a5c9c3b77136d733b0fc00c
SHA5123b0b8176616efe5828826a9eb7c882b38810ca677bd5a664f638185ab16d2e3d247a4f624b0952287a94e74f2dc0a10d48dac1503ab514af667e4dd3e12728ca
-
Filesize
4.7MB
MD5f0ad6609b15fba048671a46959b34d12
SHA102ea65d9fb66ab8684215c388c04f496e570ffe3
SHA2569522b2b05dc88174518cc635909bd39ea1ad017b972fc0b84c0b2c66fe20c7fa
SHA512a86634798c703685f66e562e79badd768bc168a6182cbda4df9a740177b3acab8bd5a33b31de3fd77501adfbb81fab71796f76b678cc455b3d3061fd1e1ca4ae
-
Filesize
1.2MB
MD5753b023dc1463ecd7b3f8807d2c5efc9
SHA1ec45bed427e799844154d008bee2aa9d7b07715b
SHA256c2295b9476901ae35fdc80dfd888aa056d15d1ef8de6de4a3e85f583ad65a5e0
SHA51259bda01e96c0e3efda02dfb9ace0ea5e962bb117bca83f0af0a02df04a609bd755fd538bc1b960e154ccd23d596afa6a46088e274cd96ecf239900505a0b9db2
-
Filesize
11.1MB
MD59e6da0ffec832dcb2bb0626e2fab333d
SHA1a89f931b7c7fdc69d6255c4d7291ea3506a1b93e
SHA2563746c214adcc94110a99a9839c57cb1cb4b2cfd0f461909252bfe3ad2a0ad7d6
SHA512b6553729876d1b80416470ac409ea72d6eb35eed6d858a9485ade0dbb2a35a228dff5a1046cfbd31d99ba3f5a49284b23db102292728a9d2f90b10a50821a680
-
Filesize
8KB
MD5b6430b4ce0a0662ea8590dead00295e8
SHA1beb30a3c4871194f9df94edea787d98f20ea562a
SHA2569f72e4cd921518dd4a035f9899ad1f3af03d2d68c0c47538fada17404e5531e3
SHA512022f3378199ed9109d8c9f9f8e6d230aac988ca34d813ecd5e7d40088a5b6abc160d2167faf8033391a642e2a683a5ff760b1848e8c28f4d4a398a9e7fa0b521
-
Filesize
1KB
MD508e37fc597190e47ba0e9b7d13c944ce
SHA16c5079480a7cc4995ac083dbc056c3a84ab79315
SHA256aabef25500392fc0baf747b0fee1ae36bccc530fb62d130c32aa95031d2b144c
SHA5129063b5f5c79dbcd428421dc72f0cb3112376caff7cdbd884d37b482316b05ae901edcffbb1e724a893ef006517ffbb34fcda67a7b1d48055ec967f33941e7fb7
-
Filesize
7.2MB
MD500f3158aa3cac845a8ddbce86cf20560
SHA18a4f81c33de9df0b93408035e7f3b01549775299
SHA2569aacb21993e4e40a503c34fb2fa0e5fc315902b76ebb902c2eea340d84d17b33
SHA512f3bf4729dde81fb99a501725376fbdd57eb05f3290d314a5f9742c4da7e794d3ea85b6bad6c07f1103707261ef78b38d0a9afd2fb75fc62abfc27a59ff533a6e