Malware Analysis Report

2024-10-18 22:05

Sample ID 240616-2nhmcs1hkg
Target 2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber
SHA256 c2b7ffd3e310d87f039badc497c2d8163a1aff0a8f12c5289daaefdf35cfda6a
Tags
bootkit persistence
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

c2b7ffd3e310d87f039badc497c2d8163a1aff0a8f12c5289daaefdf35cfda6a

Threat Level: Shows suspicious behavior

The file 2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber was found to be: Shows suspicious behavior.

Malicious Activity Summary

bootkit persistence

Writes to the Master Boot Record (MBR)

Checks for any installed AV software in registry

Executes dropped EXE

Loads dropped DLL

Suspicious use of AdjustPrivilegeToken

Modifies system certificate store

Modifies registry class

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Uses Task Scheduler COM API

Checks processor information in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-16 22:43

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 22:43

Reported

2024-06-16 22:46

Platform

win7-20240611-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe"

Signatures

Checks for any installed AV software in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avast Software\Avast C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "90d915e1-44d4-4e51-a717-f41ee997c295" C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "90d915e1-44d4-4e51-a717-f41ee997c295" C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAA9TdQ7MdVdUyefSRdUnZeNgQAAAACAAAAAAAQZgAAAAEAACAAAACUJZJ6iewCaAhOLZL1nnJKc0WBwbZrXtO0i0kqt+E9SwAAAAAOgAAAAAIAACAAAACW3lDS6B5wigbzZok6XdMDhR7rAHp2c5COA2OcaFvnZTAAAAAXrJyqksf/8XWNzIslFg2f47L7CYLk0Coc+bsXyu6N5epAtv9wAmWZ3GCM7avK5ChAAAAAB/BFMjOGHqPbkEjZF6Pjfut4oC/B1fTX0RENhIRp2zXrl1bg5TDUOXzNEzouP742jcE7/qjNDthm/PxP2fxA2A==" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "90d915e1-44d4-4e51-a717-f41ee997c295" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2468 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe
PID 2468 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe
PID 2468 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe
PID 2468 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe
PID 2404 wrote to memory of 2136 N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe
PID 2404 wrote to memory of 2136 N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe
PID 2404 wrote to memory of 2136 N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe
PID 2404 wrote to memory of 2176 N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe
PID 2404 wrote to memory of 2176 N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe
PID 2404 wrote to memory of 2176 N/A C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe"

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\icarus-info.xml /install /sssid:2468

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe /sssid:2468 /er_master:master_ep_ad7db90d-bd43-4a73-b10e-be4f8238cf9f /er_ui:ui_ep_27f9a1c3-bebd-4b2f-934f-712c3b8dc7ac

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus.exe /sssid:2468 /er_master:master_ep_ad7db90d-bd43-4a73-b10e-be4f8238cf9f /er_ui:ui_ep_27f9a1c3-bebd-4b2f-934f-712c3b8dc7ac /er_slave:avg-tu_slave_ep_fab9f1ab-5a86-4f02-b66a-6c48af6c2e92 /slave:avg-tu

Network

Country Destination Domain Proto
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
GB 2.21.189.79:443 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 shepherd.avcdn.net udp
US 34.160.176.28:443 shepherd.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 honzik.avcdn.net udp
GB 2.21.189.79:443 honzik.avcdn.net tcp
GB 2.21.189.79:443 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp

Files

\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus.exe

MD5 97856ab19be2842f985c899ccde7e312
SHA1 4b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA256 2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512 b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

C:\ProgramData\AVG\Icarus\Logs\sfx.log

MD5 33f243c263ec20ae9ac703534cbd59d3
SHA1 1428fdaef85bc14372e4cb7da55a7ce81f716fc0
SHA256 b44264c9eebea5c2f176e4e54dc3a363bd73e28dd4f823b63c0ffc9fee2bec4c
SHA512 1446c36abd9808b9c55e84e203cb02e2bca56e3717520e9f459a06ba6a04c18195fdb90a918fd21133eb12fe3e07a9d79b9ba5da0dffca4708a364aa48a9f30d

C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

MD5 5cad0ddee43f6871b25823bb476c7b6c
SHA1 3b26c0e0fd87017fb981c05b97cd01cef1749881
SHA256 ffefe9a21c14ce8de7548f963aa935f74428c2ba8cd646c644ccdf33ba498fea
SHA512 bf5c43ebb5188a79341b32d7204ece30d876be66370d3dbfe8922a74a587bd7f3d14cb3e30830184710bd98deac05ea4038c8a16ac6bf53eafe998e5d6a48cf2

C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

MD5 168f03c5c241049561d93853fa2304dc
SHA1 ee086aa5bc60436a75015003cb2dd27ae57620ff
SHA256 374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e
SHA512 169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\eref.edat

MD5 6e74ea426fd38d1886fcaf9fbb721bde
SHA1 3ebd160220e8bb529990a2d549b150342d434db6
SHA256 37c29c0ef93f2ad79eb12b0694cd7e3f16961c2c738c21e8710921f0efded245
SHA512 6a64d28cea38d7a32a16f983599d857248151f433fe4c8eaaf01e099bf6c4eaa5929a2f6bb1d3381e6f9218ec3bff7956808aca9c094c84b382aea0138423b99

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\icarus-info.xml

MD5 e410f85c4ed60cc77a1ab5fa037efd59
SHA1 5016a1e1ba04fc6f37f29018625ac70f99bd6942
SHA256 1112822f0ad3f35b56954daa4b2f5f768416a0b5067a2e9471bf972729cb78fd
SHA512 41cd2cd3ad95729ffc82a83e05eeb2ee9b7e71e027b5a38c77c397649659d719c959b8ca753f5c7fdac03dc14a66192751f00947333ec899439a82e5785b5448

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\icarus_ui.exe

MD5 7ebae16a6ea514e55f7160c3539261cc
SHA1 ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256 f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512 f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\product-info.xml

MD5 bdc8e86d841795137dc29fa962aa1ee6
SHA1 6e847883cc6884a8c269adfd19022cbba4be58cd
SHA256 73dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA512 12ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\ecoo.edat

MD5 83d25654a2d6c01e2ea4e7ea23c14d2f
SHA1 e69d72389e74e176c7d1bc935dbc692a3b6abe9f
SHA256 8f4f9016a5e5257326fc5b9c04665716f8262dd00a49098b6c55c1bd53d3e0bb
SHA512 69efffa99770c019f29440bb1a055bcf252775c5afcca7cb904aac0182864772ce0bcacdcda0b4fffe4fca48adf521844c6da33289f90ee17028bece9ead0407

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\setupui.cont

MD5 c95dc978812b51e1b9aa38c27faf3b1a
SHA1 70dee9e4f828652f6be927a193be6938bc175ce4
SHA256 4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA512 5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\dump_process.exe

MD5 c22d80d43019235520344972efec9ff2
SHA1 1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA256 5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512 f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\common\bug_report.exe

MD5 0c0f0ca2bb49dfa3743e9d4156007c70
SHA1 042fdfba346a89a83f0c782117038a82b29a28d1
SHA256 0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512 e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\product-def.xml

MD5 4f70105a30bbb4c3ac6e563f02852e62
SHA1 ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA256 5d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA512 90295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5

memory/2136-83-0x000007FFFFF70000-0x000007FFFFF80000-memory.dmp

C:\ProgramData\AVG\Icarus\Logs\sui.log

MD5 88957dc70d7a8de12c0b7083c44eb61e
SHA1 c992bb85fd27c084bd5f42ff095a7f2272a524ac
SHA256 5f671c37dc50f974700f68c3d216da79e0c491ac7cacbe48bdf22336bd6f64f7
SHA512 5a54eecbfcdd2e93591fc55bb4dc29e287cd443c064ea3db46b00b4ced01fcd35ea3a4482efd87a528a2da44f2f896397899c82b11a2fb5fd3b7e2e1bfc88756

C:\ProgramData\AVG\Icarus\Logs\report.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\ProgramData\AVG\Icarus\Logs\icarus.log

MD5 7b893cc21c22b4c80adaf1b54e98d9f9
SHA1 ff0fc7fa94f321d64231d273d6bc85fb9aa0bf2f
SHA256 eafcf1752157dae6b30addeff32238e99f3cfeeacb3079894e574eea21158f40
SHA512 cf6f26281960362bdb1d2dfe27fe111590d02ab2d8a61d3cc6fb79bcca2f6d3c7a101b3673a8391300f9fad4c44c904f29fc2ebad3d3596de1df73d39f93100e

C:\ProgramData\AVG\Icarus\settings\proxy.ini

MD5 b8853a8e6228549b5d3ad97752d173d4
SHA1 cd471a5d57e0946c19a694a6be8a3959cef30341
SHA256 8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512 cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\config.def

MD5 d74cac8e23617717dcbac5d12be7e108
SHA1 573f84282e738e302b822eb9842500bf1b4b3b39
SHA256 a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512 b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052

C:\Windows\Temp\asw-e9eea896-3ff7-4f91-9155-bed546ba374f\avg-tu\icarus_product.dll

MD5 2f8931c51ebbe01d0c1d87d5ad2d652f
SHA1 a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256 add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA512 2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 22:43

Reported

2024-06-16 22:46

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

51s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe"

Signatures

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAA1QEjAc/rEUmt/LBYo5AIGgQAAAACAAAAAAAQZgAAAAEAACAAAACi4q4dbA1U7r5V4afJXsp85uS5jqqM2iUp0LsSPgb3RwAAAAAOgAAAAAIAACAAAACxNfg8ymkNQcssdQTYLSzJQUGUWs1ZOmUvXSgNC/oeNTAAAADod/YFzVNdl82f9ypb66KhA/Ki8FbadCfaTx5xmxwAvsZdOIFf0zKrIf8Xa8jFX+pAAAAARPy5Zt+cajouQusYZrF1ydY7fPqj7n7n0Xwo/LNccV2UVNkRB+Wv9h3N3nHjCnHaM2RMEpgaf6iXV6Ks1iCjAg==" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "65d4546d-461f-40f2-b405-45302b430d9f" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_a4642c56f2730ca91508fb5246072aa0_magniber.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 analytics.avcdn.net udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 analytics.avcdn.net udp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 analytics.avcdn.net udp
US 8.8.8.8:53 analytics.avcdn.net udp

Files

N/A