Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 22:08

General

  • Target

    668a2469327102cece9ca2e8ed40df1ee260d90e760a5fbb0804137c6ed45d97.exe

  • Size

    1.5MB

  • MD5

    93bb25377ce67906ac4bdf6851630bb8

  • SHA1

    6cfd036344bb5e0b1c39183fcf9321a9b46f1d33

  • SHA256

    668a2469327102cece9ca2e8ed40df1ee260d90e760a5fbb0804137c6ed45d97

  • SHA512

    83947844a419182bc0ae53740f7521945c922a65647ccfac09ad25905b334e0e363bde52bd62e88dd8e8265d2c4f9d48350dfc3e512bc36a1cd980c294965e82

  • SSDEEP

    49152:vWUMv5De9/yG9/ooooERQr0tb6H8RlOuQhRe4hvR:vWUMqyGB0Z6H8Rl4y0

Score
6/10

Malware Config

Signatures

  • Checks for any installed AV software in registry 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 10 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\668a2469327102cece9ca2e8ed40df1ee260d90e760a5fbb0804137c6ed45d97.exe
    "C:\Users\Admin\AppData\Local\Temp\668a2469327102cece9ca2e8ed40df1ee260d90e760a5fbb0804137c6ed45d97.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Loads dropped DLL
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\icarus.exe
      C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\icarus-info.xml /install /sssid:2192
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\icarus_ui.exe
        C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\icarus_ui.exe /sssid:2192 /er_master:master_ep_38f46a0b-0f60-4527-a263-abe4810b1bb1 /er_ui:ui_ep_a9587bc1-0469-44bd-aa21-6e915e70f54b
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:2720
      • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\avg-tu\icarus.exe
        C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\avg-tu\icarus.exe /sssid:2192 /er_master:master_ep_38f46a0b-0f60-4527-a263-abe4810b1bb1 /er_ui:ui_ep_a9587bc1-0469-44bd-aa21-6e915e70f54b /er_slave:avg-tu_slave_ep_4829eafd-88b6-4054-85b7-26eb525773a6 /slave:avg-tu
        3⤵
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AVG\Icarus\Logs\icarus.log

    Filesize

    44KB

    MD5

    683d6db9273c267e48ea39fb1ace9d68

    SHA1

    0b75e9fe478be5b034ccb91b28ac715d3cd15864

    SHA256

    c27684d4819e0b93e09a62487a61ddf743acba27216f3d2a9de0d12c294c7e09

    SHA512

    7175d468eb0f9964c3fc2ca053980f3d44b1663aeb666ba22a286d9b6e09ea8107fee0eeedc69d5013d94ddf8ba63bf210a002d83fa0851def5424c34763fa7e

  • C:\ProgramData\AVG\Icarus\Logs\report.log

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\ProgramData\AVG\Icarus\Logs\sfx.log

    Filesize

    11KB

    MD5

    4d7d60eaa582c4b4763fc54fa471da42

    SHA1

    9c48bbf7fec67ac991651b3f29b837dea4b6ab43

    SHA256

    165f157f0aeaf13a93f2cba5dd97bd2ba1805fe3f6940b26ed828200f9a00724

    SHA512

    5e9133363273385885a700212446c5c2bb33c9deddfeaabd2fd76bbcc59d8821808fcff00001dc30d223475dd70acd0a3dd77d2784f27e560f1bd1eaf9de0f52

  • C:\ProgramData\AVG\Icarus\Logs\sui.log

    Filesize

    13KB

    MD5

    ac96a58e710cbfae8b5d29a969f0dfb7

    SHA1

    8a72f9dbe63e37de43f634e90212ce020f44b4d0

    SHA256

    6410134ea0f06b90dd6f249192d0291bdc6b839316ab89987bd3a1971086adb0

    SHA512

    ce7039c483efa5aa9b7bbb2799b5f7c8fede3959a8dec8425cb920e441cbc4eefb7c89bc7d7df696e82532bf895c2ab9b9f37088ecd76084041fa58cd3dd0fd2

  • C:\ProgramData\AVG\Icarus\settings\proxy.ini

    Filesize

    278B

    MD5

    b8853a8e6228549b5d3ad97752d173d4

    SHA1

    cd471a5d57e0946c19a694a6be8a3959cef30341

    SHA256

    8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9

    SHA512

    cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

  • C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

    Filesize

    64B

    MD5

    22417b5d5eb168147f2c237d658a7163

    SHA1

    6ae67daf07c0a187f397923ecba497e5ab01ed58

    SHA256

    f1945b77f21bf5b8174bc94d0d69d4446baffd6808185554f8ae541e4254ecb1

    SHA512

    392b79a63b451495cc81877c288c0068d6c159bf0d7ce9ac0cc290128e57a5a1ebe0569dcbab85433448b3c1928be03cf01300ec7ae99573cfc4ef8c4c9b3cb8

  • C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

    Filesize

    72B

    MD5

    5a0c1416a86250bdcde2b2a280425e21

    SHA1

    87d6a50eec361faabc01a5ee48496e4e4b4dd025

    SHA256

    90135e66331672c8462b1e759feec46a58455baf1f3df3a3f7fbbc1b39e98fd6

    SHA512

    5ce81434ac2a211404bbc6da3eb739ab7ba68070b4e641eb69863def8ee6647f74e915ea425ebb0bcbea351bdf88d679815f634b41dfaa47c550e341f74578b6

  • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\avg-tu\config.def

    Filesize

    549B

    MD5

    d74cac8e23617717dcbac5d12be7e108

    SHA1

    573f84282e738e302b822eb9842500bf1b4b3b39

    SHA256

    a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b

    SHA512

    b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052

  • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\avg-tu\icarus_product.dll

    Filesize

    1.2MB

    MD5

    2f8931c51ebbe01d0c1d87d5ad2d652f

    SHA1

    a322fec62bbfe4d8b46199bc9001b4af74bbaf93

    SHA256

    add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd

    SHA512

    2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890

  • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\bug_report.exe

    Filesize

    4.8MB

    MD5

    0c0f0ca2bb49dfa3743e9d4156007c70

    SHA1

    042fdfba346a89a83f0c782117038a82b29a28d1

    SHA256

    0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea

    SHA512

    e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

  • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\dump_process.exe

    Filesize

    3.4MB

    MD5

    c22d80d43019235520344972efec9ff2

    SHA1

    1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc

    SHA256

    5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0

    SHA512

    f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

  • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\icarus_ui.exe

    Filesize

    11.8MB

    MD5

    7ebae16a6ea514e55f7160c3539261cc

    SHA1

    ae74b3af4926b6932aea68a32c7c8727d53a94e7

    SHA256

    f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9

    SHA512

    f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

  • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\product-def.xml

    Filesize

    228KB

    MD5

    4f70105a30bbb4c3ac6e563f02852e62

    SHA1

    ff5c730804a6d4c4806f82848e6a38c6dc9f07c9

    SHA256

    5d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0

    SHA512

    90295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5

  • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\product-info.xml

    Filesize

    6KB

    MD5

    bdc8e86d841795137dc29fa962aa1ee6

    SHA1

    6e847883cc6884a8c269adfd19022cbba4be58cd

    SHA256

    73dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b

    SHA512

    12ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c

  • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\setupui.cont

    Filesize

    257KB

    MD5

    c95dc978812b51e1b9aa38c27faf3b1a

    SHA1

    70dee9e4f828652f6be927a193be6938bc175ce4

    SHA256

    4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0

    SHA512

    5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

  • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\ecoo.edat

    Filesize

    21B

    MD5

    3da0fdcf895dfb002643293e8e40b1ea

    SHA1

    067f947bb927c59cf8c9993e310b19dfd57bed70

    SHA256

    4e93560d4a928c950f1a07f2ba6aadd197848aec782c91ea8bca5e8f2014ff1d

    SHA512

    b8eb6ee8194b48ab2a2eddd55fb82dd79a103c5efb8e3a14bc99c39f35d02b6d84f10c936acdc00042ef1fa516584a624cb680aa1b99721fdf0c6a5ba5fe3b13

  • C:\Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\icarus-info.xml

    Filesize

    1KB

    MD5

    8d18b34459f76fc9bc617d9d1f316db9

    SHA1

    e05278c82fb3386f9595d088a8725a4027303b38

    SHA256

    a1b519979d3d09e06daa0e08052a0a887cb06354fafe8c484d53b0e29f1d17e9

    SHA512

    24230c1ec33001b07acae0ee044eed8b0e266a4c3b0a56246e2a7dd74f36ca8a3e6360dda37b44ca54ca55a5b679b02292c4cb3aff69666094a696047eae7b94

  • \Windows\Temp\asw-e78d1b8e-13df-44d0-8039-2ff9cdf54861\common\icarus.exe

    Filesize

    7.7MB

    MD5

    97856ab19be2842f985c899ccde7e312

    SHA1

    4b33ff3baeba3b61ee040b1d00ebff0531cc21ef

    SHA256

    2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514

    SHA512

    b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

  • memory/2720-82-0x000007FFFFF70000-0x000007FFFFF80000-memory.dmp

    Filesize

    64KB