Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 11:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe
-
Size
1.5MB
-
MD5
bc2aa1e3a324f4921af034533e1cd99b
-
SHA1
2f4744a5b1812981969aa628eea3affc393ce3ee
-
SHA256
8f182ac690b9b9ca1ea90c983435bb110a1e923b81538452953a34b043edaec0
-
SHA512
04988476b1453cf60dea1c8c07c15f3573806d86551978861fbe44386dba4b25fd039f088fb2ab08c7e0812b1cbf1aa8579c98d40c25156c2f823f9102e2ba12
-
SSDEEP
49152:FWUMv5De9/yG9/ooooERQr0tb6H8RlOuQhRe4/vR:FWUMqyGB0Z6H8Rl4yW
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 1 IoCs
Processes:
icarus.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast icarus.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
icarus.exe2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exeicarus.exedescription ioc process File opened for modification \??\PhysicalDrive0 icarus.exe File opened for modification \??\PhysicalDrive0 2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe File opened for modification \??\PhysicalDrive0 icarus.exe -
Executes dropped EXE 3 IoCs
Processes:
icarus.exeicarus_ui.exeicarus.exepid process 1488 icarus.exe 1392 icarus_ui.exe 2308 icarus.exe -
Loads dropped DLL 1 IoCs
Processes:
icarus.exepid process 2308 icarus.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
icarus.exeicarus_ui.exeicarus.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus_ui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus_ui.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe -
Modifies registry class 10 IoCs
Processes:
2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exeicarus.exeicarus.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAKuzsMGj/pkKSDAWcsO915wQAAAACAAAAAAAQZgAAAAEAACAAAADkna+5+Rn39DVTs+2XgZNH1/ZUWNqXA4rGeNNTLGwBhAAAAAAOgAAAAAIAACAAAACzU/SdsLFNDa8j1pTOwT8dLL2o02WAyQXNqDUXqGVjfVAAAAD6MyQR//Dni6Pc5p14iAE3uxOyEnWQEOHBNmL06Xw2OiD6w4Iop49cxdCVAiY0x2U9DcW2WUq5Wb9ULEec9eQSEaFClW+NVeFv4smNxZwVHUAAAABjVZUQvofEpMX8vqY4BUHp0Atyq3sFc+biVDi6lQ/nfp5uvRXQYAM/djgiReZDPdaFc0x/qWZ8IGfKvEf3OhD4" 2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "218b6f93-f0f9-4636-a23d-b72b3c24e621" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F 2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" 2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "218b6f93-f0f9-4636-a23d-b72b3c24e621" 2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "218b6f93-f0f9-4636-a23d-b72b3c24e621" icarus.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
icarus_ui.exepid process 1392 icarus_ui.exe 1392 icarus_ui.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
icarus.exeicarus_ui.exeicarus.exedescription pid process Token: SeRestorePrivilege 1488 icarus.exe Token: SeTakeOwnershipPrivilege 1488 icarus.exe Token: SeRestorePrivilege 1488 icarus.exe Token: SeTakeOwnershipPrivilege 1488 icarus.exe Token: SeRestorePrivilege 1488 icarus.exe Token: SeTakeOwnershipPrivilege 1488 icarus.exe Token: SeRestorePrivilege 1488 icarus.exe Token: SeTakeOwnershipPrivilege 1488 icarus.exe Token: SeDebugPrivilege 1488 icarus.exe Token: SeDebugPrivilege 1392 icarus_ui.exe Token: SeRestorePrivilege 2308 icarus.exe Token: SeTakeOwnershipPrivilege 2308 icarus.exe Token: SeRestorePrivilege 2308 icarus.exe Token: SeTakeOwnershipPrivilege 2308 icarus.exe Token: SeRestorePrivilege 2308 icarus.exe Token: SeTakeOwnershipPrivilege 2308 icarus.exe Token: SeRestorePrivilege 2308 icarus.exe Token: SeTakeOwnershipPrivilege 2308 icarus.exe Token: SeDebugPrivilege 2308 icarus.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exeicarus_ui.exepid process 2144 2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe 1392 icarus_ui.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
icarus_ui.exepid process 1392 icarus_ui.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exeicarus.exedescription pid process target process PID 2144 wrote to memory of 1488 2144 2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe icarus.exe PID 2144 wrote to memory of 1488 2144 2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe icarus.exe PID 1488 wrote to memory of 1392 1488 icarus.exe icarus_ui.exe PID 1488 wrote to memory of 1392 1488 icarus.exe icarus_ui.exe PID 1488 wrote to memory of 2308 1488 icarus.exe icarus.exe PID 1488 wrote to memory of 2308 1488 icarus.exe icarus.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-15_bc2aa1e3a324f4921af034533e1cd99b_magniber.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\common\icarus.exeC:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\icarus-info.xml /install /sssid:21442⤵
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\common\icarus_ui.exeC:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\common\icarus_ui.exe /sssid:2144 /er_master:master_ep_cdffb196-21f9-47a0-a4e7-c51fd10aa79b /er_ui:ui_ep_148b77ba-bf16-45ae-ba82-74ee0f6568d53⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\avg-tu\icarus.exeC:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\avg-tu\icarus.exe /sssid:2144 /er_master:master_ep_cdffb196-21f9-47a0-a4e7-c51fd10aa79b /er_ui:ui_ep_148b77ba-bf16-45ae-ba82-74ee0f6568d5 /er_slave:avg-tu_slave_ep_6dde553c-7371-4984-a9ae-ae2d251420bb /slave:avg-tu3⤵
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3976 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\AVG\Icarus\Logs\icarus.logFilesize
41KB
MD53fb69ce520b5e30be76e1a043462f818
SHA103cdac4eb7b222874793e51095e1f1eaa05feff6
SHA2567f3d961874d5e96d638cea3bf9745356834c9b59bbc5aee4dcfd7eb0a846dc3a
SHA512d8ec993622040313f83e015c9cb0712855434bd71d137a76f991ab3bbfc6a7bd2f44b7e0db7722450b291158be6e2179c97248eba536462bb606f9d9970ea85b
-
C:\ProgramData\AVG\Icarus\Logs\report.logMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\ProgramData\AVG\Icarus\Logs\sfx.logFilesize
10KB
MD55e29be9625cd4a737956ef6590995faf
SHA1a186b03251fddb720dd5d074c6d3c29ede76fe18
SHA256db77f2d579b15c568db8a353e7f078392414328778113ebb76c189f708b11804
SHA512c7b7154124e9e38c6293c5bfeee93881647960e9cbbf8d8f5b393a0cc19ddc9eda44e418a3ecac9ae4ce06c508565d1436ef276affb1fe9a5648c434c2ae5fa7
-
C:\ProgramData\AVG\Icarus\Logs\sui.logFilesize
9KB
MD55e3dc27ca9c3e1e62f1ac9fbffcbe468
SHA16b676cdf5abb2279f464e2d11f1326adcb600d84
SHA256b92db0209f4b8ffe3fe1c6689da838375683b71fd3057a29c67e02525eb93bd0
SHA5129a273e2b36b06b8a7de7dba132cebf3666618fc88fe50f334de34246ad1b34a85510d89eb8f9826f0afcffb1f9cb64e60152f2c7dc759967681f31787dd70fa6
-
C:\ProgramData\AVG\Icarus\settings\proxy.iniFilesize
278B
MD5b8853a8e6228549b5d3ad97752d173d4
SHA1cd471a5d57e0946c19a694a6be8a3959cef30341
SHA2568e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787
-
C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3Filesize
64B
MD522417b5d5eb168147f2c237d658a7163
SHA16ae67daf07c0a187f397923ecba497e5ab01ed58
SHA256f1945b77f21bf5b8174bc94d0d69d4446baffd6808185554f8ae541e4254ecb1
SHA512392b79a63b451495cc81877c288c0068d6c159bf0d7ce9ac0cc290128e57a5a1ebe0569dcbab85433448b3c1928be03cf01300ec7ae99573cfc4ef8c4c9b3cb8
-
C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0Filesize
72B
MD58d8a7a9d3d29e6f5a739c880b49f7685
SHA108990ffa40e0487eb05fbae2ca3618c6859ab33b
SHA2568f82e4964557b54d3774ba24f27bd7121371b233175b096cf9fb4a6ede218eb8
SHA5128fafa5042fb74cfe03ded6e68647ac238fc5a4e198dd05a0f4fcd6581f422827dbc0b0211760e27f96a4c75d44495f08d87dc140aac4f4a0f24d089ca7dec968
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\avg-tu\config.defFilesize
549B
MD5d74cac8e23617717dcbac5d12be7e108
SHA1573f84282e738e302b822eb9842500bf1b4b3b39
SHA256a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\avg-tu\icarus_product.dllFilesize
1.2MB
MD52f8931c51ebbe01d0c1d87d5ad2d652f
SHA1a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA5122018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\avg-tu\product-def.xmlFilesize
228KB
MD54f70105a30bbb4c3ac6e563f02852e62
SHA1ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA2565d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA51290295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\common\bug_report.exeFilesize
4.8MB
MD50c0f0ca2bb49dfa3743e9d4156007c70
SHA1042fdfba346a89a83f0c782117038a82b29a28d1
SHA2560e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\common\dump_process.exeFilesize
3.4MB
MD5c22d80d43019235520344972efec9ff2
SHA11a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA2565841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\common\icarus.exeFilesize
7.7MB
MD597856ab19be2842f985c899ccde7e312
SHA14b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA2562569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\common\icarus_ui.exeFilesize
11.8MB
MD57ebae16a6ea514e55f7160c3539261cc
SHA1ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\common\product-info.xmlFilesize
6KB
MD5bdc8e86d841795137dc29fa962aa1ee6
SHA16e847883cc6884a8c269adfd19022cbba4be58cd
SHA25673dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA51212ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\common\setupui.contFilesize
257KB
MD5c95dc978812b51e1b9aa38c27faf3b1a
SHA170dee9e4f828652f6be927a193be6938bc175ce4
SHA2564bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA5125202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\ecoo.edatFilesize
21B
MD598ffd056ac1141b65944542cedc96c0b
SHA14bbeb5d47288a23bff91c522223ca65275db0696
SHA2561fa7b0413ac9321695e69afae3ca27ff25e9e75902c77407c15384b8498c469e
SHA512081b1fa21a7643279fd82c42b36059e58712caa61e3ccaf4f9a7308a8b0cce682ffe7c22320a334d4f7f3844bb5271b487690239e5f8c52d4750e4f08937e414
-
C:\Windows\Temp\asw-f7a14ca2-786c-472a-8ff9-4ffd04f8bc1c\icarus-info.xmlFilesize
1KB
MD53d63d4d764bd07668dd96cd04170d3da
SHA195789a037ee5ecaf4cca1216665bc014ebaa54b9
SHA25614dc3b4a46bfde17f4ad797a7720461356eced7477c9d76b132a2cb5c42e9748
SHA512c77c43e8eb6f9d9739e67efd2e200c9a4d42d4d663fe9a1eaa08bbf891fbab0269ef1ff0c8711c367acdd0bbd345e12728783999712a18187de2f6e82549fccb