Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe
-
Size
1.5MB
-
MD5
f5f76a42c4a1de9a5125d46a065dd3a3
-
SHA1
645ebb0adb846d0108819827a1cb2f74f1c366f7
-
SHA256
0b0b1c81aa571bc75d537588798c410d9ba11c8fd2b3669f6445d084d575d2b9
-
SHA512
3023405384ae867e713dfd52d8007ea6f16118b7ac95f0f82b33eb781da41cc6db9abfdd96f9e77b6ae802d4fdb29ff916bc5749cc9472b0ced87a9e4d49c805
-
SSDEEP
49152:oWUMv5De9/yG9/ooooERQr0tb6H8RlOuQhRe4hvR:oWUMqyGB0Z6H8Rl4y0
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 1 IoCs
Processes:
icarus.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast icarus.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exeicarus.exeicarus.exedescription ioc process File opened for modification \??\PhysicalDrive0 2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe File opened for modification \??\PhysicalDrive0 icarus.exe File opened for modification \??\PhysicalDrive0 icarus.exe -
Executes dropped EXE 3 IoCs
Processes:
icarus.exeicarus_ui.exeicarus.exepid process 3960 icarus.exe 4424 icarus_ui.exe 3460 icarus.exe -
Loads dropped DLL 1 IoCs
Processes:
icarus.exepid process 3460 icarus.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
icarus.exeicarus.exeicarus_ui.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus_ui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus_ui.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe -
Modifies registry class 10 IoCs
Processes:
2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exeicarus.exeicarus.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F 2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" 2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9eec7631-a017-4d1f-a649-c232f22ef7b5" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAR4G/3BTRD02oLurJAKilegQAAAACAAAAAAAQZgAAAAEAACAAAAAkJjZ1mklRmCCnzURPxb7qpRUJoLTw3uW+ZjgYA8NE1QAAAAAOgAAAAAIAACAAAABTt/0htrAaH0EYb7Te1UkHJY7BKQxecYkSNoz0KwoqIFAAAACyjAUAx8Pq03lST1VqjlsyjHXh9GPGkWMBwOWlTznTYRbA5HwMoyOiseRvb+YkZ4npVh6sTi3Cxwag98vHO2dJeYOk1pezEVCMfiT5UkbUNEAAAABrLZnshSNx1yvG3jBvEfqyAmRu9SQUpR5bLvzuWZ356cDkiJEr0n498eX3AK/jlFzz7gkyieTGzalKgLzB1a+h" 2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9eec7631-a017-4d1f-a649-c232f22ef7b5" 2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9eec7631-a017-4d1f-a649-c232f22ef7b5" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "66FC9A86B023D8FFC79948E2D373B0F2" icarus.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
icarus_ui.exepid process 4424 icarus_ui.exe 4424 icarus_ui.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
icarus.exeicarus_ui.exeicarus.exedescription pid process Token: SeRestorePrivilege 3960 icarus.exe Token: SeTakeOwnershipPrivilege 3960 icarus.exe Token: SeRestorePrivilege 3960 icarus.exe Token: SeTakeOwnershipPrivilege 3960 icarus.exe Token: SeRestorePrivilege 3960 icarus.exe Token: SeTakeOwnershipPrivilege 3960 icarus.exe Token: SeRestorePrivilege 3960 icarus.exe Token: SeTakeOwnershipPrivilege 3960 icarus.exe Token: SeDebugPrivilege 3960 icarus.exe Token: SeDebugPrivilege 4424 icarus_ui.exe Token: SeRestorePrivilege 3460 icarus.exe Token: SeTakeOwnershipPrivilege 3460 icarus.exe Token: SeRestorePrivilege 3460 icarus.exe Token: SeTakeOwnershipPrivilege 3460 icarus.exe Token: SeRestorePrivilege 3460 icarus.exe Token: SeTakeOwnershipPrivilege 3460 icarus.exe Token: SeRestorePrivilege 3460 icarus.exe Token: SeTakeOwnershipPrivilege 3460 icarus.exe Token: SeDebugPrivilege 3460 icarus.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exeicarus_ui.exepid process 4480 2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe 4424 icarus_ui.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
icarus_ui.exepid process 4424 icarus_ui.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exeicarus.exedescription pid process target process PID 4480 wrote to memory of 3960 4480 2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe icarus.exe PID 4480 wrote to memory of 3960 4480 2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe icarus.exe PID 3960 wrote to memory of 4424 3960 icarus.exe icarus_ui.exe PID 3960 wrote to memory of 4424 3960 icarus.exe icarus_ui.exe PID 3960 wrote to memory of 3460 3960 icarus.exe icarus.exe PID 3960 wrote to memory of 3460 3960 icarus.exe icarus.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-16_f5f76a42c4a1de9a5125d46a065dd3a3_magniber.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exeC:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\icarus-info.xml /install /sssid:44802⤵
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus_ui.exeC:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\common\icarus_ui.exe /sssid:4480 /er_master:master_ep_81aabd08-f636-4b9b-b946-fdd82956cb45 /er_ui:ui_ep_90dd5374-b9b2-4e42-98b0-523f044901793⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4424 -
C:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exeC:\Windows\Temp\asw-ab57d9e1-b764-4d33-b4cf-aa7134d90673\avg-tu\icarus.exe /sssid:4480 /er_master:master_ep_81aabd08-f636-4b9b-b946-fdd82956cb45 /er_ui:ui_ep_90dd5374-b9b2-4e42-98b0-523f04490179 /er_slave:avg-tu_slave_ep_0ca3faac-d3dc-41a1-af51-e461a8b0770b /slave:avg-tu3⤵
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4144 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:1072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5ad88c29b430b97c0cd734d611052fb63
SHA1339c608c56bd6ca54d99510a0f5fec6f64034535
SHA25688ad6b849a4305993aec4e4fe5f7d8ad281a1f314002c4d8eb79b63371386186
SHA512f6127547307871ffc11be7c99a1082b855ba36b29a5565495801ba3c94df5378edc96621214470a5ac8a3fa897125941477f30a8b0c9ff99aae913ce1e0d5446
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
11KB
MD5eb431903802b737554598817d4140f58
SHA10702c12855bdf6fe5181072b099971f2b6cd51ba
SHA2565f10293a0b4473ec74d2f3eae4fe8814b03a4d05eeb935ccacc74e28b99f1bd6
SHA512cb92375c2e246a59cab7d447c9743538553a0cb965447d07d79c2c9cea9cab8e9f6fbfa4dfecc730e6352410b9767b2307850a23daceed414c471f4304b80086
-
Filesize
10KB
MD51b57e784922e2f045e97288da45d9a8c
SHA1883ec523b232e1365625f8911da428005a247197
SHA256aeaf93a1f9fa7abb3384ed061703b0456483ac069d5fd207005e1e285455cfbc
SHA51254a7e0839521b39df923cb35dbb42ea874a6b8a915052a3438716748a025c65684b2b74ebb769fc1bcafe7ba1b33501751e9002cf2496a8058648e04fafb32e6
-
Filesize
278B
MD5b8853a8e6228549b5d3ad97752d173d4
SHA1cd471a5d57e0946c19a694a6be8a3959cef30341
SHA2568e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787
-
Filesize
64B
MD522417b5d5eb168147f2c237d658a7163
SHA16ae67daf07c0a187f397923ecba497e5ab01ed58
SHA256f1945b77f21bf5b8174bc94d0d69d4446baffd6808185554f8ae541e4254ecb1
SHA512392b79a63b451495cc81877c288c0068d6c159bf0d7ce9ac0cc290128e57a5a1ebe0569dcbab85433448b3c1928be03cf01300ec7ae99573cfc4ef8c4c9b3cb8
-
Filesize
72B
MD54bcc9c5eca1e19a47f74e21e7f875bb2
SHA11bbe42bace33e0494d533b68941d7ed7a37cc361
SHA256497696e8a26918c886b5f3a6a8ef18a8f370b39c2fa177c77f0b1ee873644b90
SHA5121109495c368581d20d25747c54c92e8337e723b5641ae84cf209765c8654331e35dea3ceef7d234f8e4d59429b8a42e05bb1bfd443cbeace36d653ca21e216f6
-
Filesize
549B
MD5d74cac8e23617717dcbac5d12be7e108
SHA1573f84282e738e302b822eb9842500bf1b4b3b39
SHA256a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052
-
Filesize
1.2MB
MD52f8931c51ebbe01d0c1d87d5ad2d652f
SHA1a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA5122018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890
-
Filesize
228KB
MD54f70105a30bbb4c3ac6e563f02852e62
SHA1ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA2565d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA51290295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5
-
Filesize
257KB
MD5c95dc978812b51e1b9aa38c27faf3b1a
SHA170dee9e4f828652f6be927a193be6938bc175ce4
SHA2564bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA5125202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0
-
Filesize
4.8MB
MD50c0f0ca2bb49dfa3743e9d4156007c70
SHA1042fdfba346a89a83f0c782117038a82b29a28d1
SHA2560e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92
-
Filesize
3.4MB
MD5c22d80d43019235520344972efec9ff2
SHA11a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA2565841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc
-
Filesize
7.7MB
MD597856ab19be2842f985c899ccde7e312
SHA14b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA2562569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f
-
Filesize
11.8MB
MD57ebae16a6ea514e55f7160c3539261cc
SHA1ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369
-
Filesize
6KB
MD5bdc8e86d841795137dc29fa962aa1ee6
SHA16e847883cc6884a8c269adfd19022cbba4be58cd
SHA25673dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA51212ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c
-
Filesize
21B
MD524db7359a3bd3947b750594af0f959f6
SHA10d2e88bef39c2ae1329f3635dff2302cfbb5166d
SHA256fe8c8dbe1ae7bf180b15f0a1df407c6e8243f5bbbe3adba04fabad3c2ae353fa
SHA512eac1585ab7cbd647f3f716a2b8d1ac58d767d1584a7cc246234d6722cca9eedacf14d25d3246006e8e1de39bd1786a2adb39b0f27097c676fae984a6e9f3e8e6
-
Filesize
51B
MD590393b99cbdbe0ff222a4987e3e20605
SHA175add246c8ad221099e753746050e492f55c45ea
SHA2566e848b8564fe151cf4f8960dececbf6080cff79c885da3401c84680f9a13b933
SHA5126f9d0a1b225377052fb65f988969aa0b8f0b67cfd5c1d11a9db2af53cb3205820ad01a2b469d13de7b9161d427791f8d7e80a1b3d0381284c4cccc1a9708706e
-
Filesize
1KB
MD5d40f162e23b004cace86d1aa7d36c1a0
SHA18cb7f729dccef95017503e43f3c132f86ac78041
SHA25610212c0ca7334cb218557e53241391d5e9ead1b2d4a2c9041b62e27b65e4ab77
SHA512683bb3258200d8d25d2d64f1a7aa102f09b827c563277eff71c445624a39f5aef8036c1b4669a9559216822217bdcbd04a7795a2b751139ec9b5fd11b2a59501