Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe
-
Size
1.5MB
-
MD5
a7b4b48175c0cf24595e0bf6876ff047
-
SHA1
2df4dde599596688ae32348773499ad99e2bf9c9
-
SHA256
c99976e7cd34a63e91cc90e782db0b39254749ea0cb1c8d0499408fa64cd6da0
-
SHA512
cabda032d7d4fa65d36f89bf4e936e4775da39f7c272404d7a0621c1db7e40442c28d85e4191ae7449be4c036126f75bf25a2bbd884606ee232fc8774e716aa2
-
SSDEEP
49152:ZWUMv5De9/yG9/ooooERQr0tb6H8RlOuQhRe4hvR:ZWUMqyGB0Z6H8Rl4y0
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 1 IoCs
Processes:
icarus.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast icarus.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exeicarus.exeicarus.exedescription ioc process File opened for modification \??\PhysicalDrive0 2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe File opened for modification \??\PhysicalDrive0 icarus.exe File opened for modification \??\PhysicalDrive0 icarus.exe -
Executes dropped EXE 3 IoCs
Processes:
icarus.exeicarus_ui.exeicarus.exepid process 1072 icarus.exe 4640 icarus_ui.exe 3576 icarus.exe -
Loads dropped DLL 1 IoCs
Processes:
icarus.exepid process 3576 icarus.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
icarus.exeicarus.exeicarus_ui.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString icarus.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 icarus_ui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz icarus_ui.exe -
Modifies registry class 10 IoCs
Processes:
2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exeicarus.exeicarus.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9fa6f048-2f3f-4b4d-b7a2-3ad83d85215c" 2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9fa6f048-2f3f-4b4d-b7a2-3ad83d85215c" icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F 2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" 2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAnHM29NDJvUeqBeCWlEOrbgQAAAACAAAAAAAQZgAAAAEAACAAAADckKRoeUkPqB9cn5x4ueEqLe7CiWb4BH/3Lqd1OgdlUgAAAAAOgAAAAAIAACAAAABtMvSgH4x8vPdoQnp2I7AtoJjDBtHOzri9JUlooX7j+jAAAAChS0DjVeicLs0tx8QhY/cN8BRXW+E4vfvXEAAC69/BMCbAa/Mw2viAN7jHbCuzgqBAAAAAsdh1guUhXuY3gb6k2RdPRuCViG2+pklULpjfjfESx1aILkNOXPx0BgTHYQ697peXP9HndnZi/EVqvWfukQixPQ==" 2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9fa6f048-2f3f-4b4d-b7a2-3ad83d85215c" icarus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F icarus.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
icarus_ui.exepid process 4640 icarus_ui.exe 4640 icarus_ui.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
icarus.exeicarus_ui.exeicarus.exedescription pid process Token: SeRestorePrivilege 1072 icarus.exe Token: SeTakeOwnershipPrivilege 1072 icarus.exe Token: SeRestorePrivilege 1072 icarus.exe Token: SeTakeOwnershipPrivilege 1072 icarus.exe Token: SeRestorePrivilege 1072 icarus.exe Token: SeTakeOwnershipPrivilege 1072 icarus.exe Token: SeRestorePrivilege 1072 icarus.exe Token: SeTakeOwnershipPrivilege 1072 icarus.exe Token: SeDebugPrivilege 1072 icarus.exe Token: SeDebugPrivilege 4640 icarus_ui.exe Token: SeRestorePrivilege 3576 icarus.exe Token: SeTakeOwnershipPrivilege 3576 icarus.exe Token: SeRestorePrivilege 3576 icarus.exe Token: SeTakeOwnershipPrivilege 3576 icarus.exe Token: SeRestorePrivilege 3576 icarus.exe Token: SeTakeOwnershipPrivilege 3576 icarus.exe Token: SeRestorePrivilege 3576 icarus.exe Token: SeTakeOwnershipPrivilege 3576 icarus.exe Token: SeDebugPrivilege 3576 icarus.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exeicarus_ui.exepid process 412 2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe 4640 icarus_ui.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
icarus_ui.exepid process 4640 icarus_ui.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exeicarus.exedescription pid process target process PID 412 wrote to memory of 1072 412 2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe icarus.exe PID 412 wrote to memory of 1072 412 2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe icarus.exe PID 1072 wrote to memory of 4640 1072 icarus.exe icarus_ui.exe PID 1072 wrote to memory of 4640 1072 icarus.exe icarus_ui.exe PID 1072 wrote to memory of 3576 1072 icarus.exe icarus.exe PID 1072 wrote to memory of 3576 1072 icarus.exe icarus.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exeC:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\icarus-info.xml /install /sssid:4122⤵
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus_ui.exeC:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus_ui.exe /sssid:412 /er_master:master_ep_446d3dcb-eaa5-4cd7-9d9e-1163474c0135 /er_ui:ui_ep_36fd5a80-1726-4085-83cc-6277e57667df3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4640 -
C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exeC:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe /sssid:412 /er_master:master_ep_446d3dcb-eaa5-4cd7-9d9e-1163474c0135 /er_ui:ui_ep_36fd5a80-1726-4085-83cc-6277e57667df /er_slave:avg-tu_slave_ep_7f12a5be-b1b8-4a88-a1d8-3f6ea1cf5108 /slave:avg-tu3⤵
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD57b40b01b917bf2dae927642f94c5251b
SHA1da3083c3e1e418c83e57463981b5c15d620a9971
SHA2567a0e361f1b9e999d9981c3eed1cd5fff1b5f8724bdfd9e96e858d897528534a9
SHA512425ca0bbbac07f4c46f3fded41c1e5780b191099e67b8d3e2706e25f1f3cf9048ef7c6fe13f7a87f7f22bfd073965fc3af5327c0e24ab3ae81f7056e77f9051b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
11KB
MD554ad48304dbe18e89856ddf8df8d4eb7
SHA16172c8ec31a1f83c1d9a5d1cb1f70f75ed9a7512
SHA2561e187bc76243673802336284852e4bb1806d15af7f8a6ab0bb2524a3bb562892
SHA51228eec9cff2e6545031cad3b30970b626e79d6592fe5d02be765af521027e0d16a7bf265fd449d3df89286cfe4ae093165facf184ba8094073b37af4f906a6604
-
Filesize
14KB
MD5181261a23b7fdd08262bf176f54895d9
SHA15cfa1dca954fe1a65c72663910847cadeba83ed7
SHA25694da205c1ece7b2448406ae719ea2864966c8534e6480815e4e7293fddacf8a6
SHA512b32994a4bf3d8863e2c3284c9b72fc5a30105dc4c79514cf546fa38f597bf5bf83bccc7276c64caa5be9ab5b21598e50b32a8b33df3aeeb7f0e15bdc343af140
-
Filesize
278B
MD5b8853a8e6228549b5d3ad97752d173d4
SHA1cd471a5d57e0946c19a694a6be8a3959cef30341
SHA2568e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787
-
Filesize
64B
MD5168f03c5c241049561d93853fa2304dc
SHA1ee086aa5bc60436a75015003cb2dd27ae57620ff
SHA256374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e
SHA512169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179
-
Filesize
72B
MD5f79bed2e595a92512e2205639352049d
SHA118a25f15331375da7916b809c64c32c831022384
SHA25649406063ecabcca340375a509470baf12627cf22daf875a2491fcf5f7dc11b75
SHA512cfe42b7c426f39e6e4e8dc481663f8e907fe8e5138371a22459eceec9c8dfbef3ef8d2404e3f80cf80c6ad9d649cff548a178e39535ab6f59680337856458d7a
-
Filesize
549B
MD5d74cac8e23617717dcbac5d12be7e108
SHA1573f84282e738e302b822eb9842500bf1b4b3b39
SHA256a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052
-
Filesize
1.2MB
MD52f8931c51ebbe01d0c1d87d5ad2d652f
SHA1a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA5122018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890
-
Filesize
228KB
MD54f70105a30bbb4c3ac6e563f02852e62
SHA1ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA2565d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA51290295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5
-
Filesize
4.8MB
MD50c0f0ca2bb49dfa3743e9d4156007c70
SHA1042fdfba346a89a83f0c782117038a82b29a28d1
SHA2560e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92
-
Filesize
3.4MB
MD5c22d80d43019235520344972efec9ff2
SHA11a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA2565841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc
-
Filesize
7.7MB
MD597856ab19be2842f985c899ccde7e312
SHA14b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA2562569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f
-
Filesize
11.8MB
MD57ebae16a6ea514e55f7160c3539261cc
SHA1ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369
-
Filesize
6KB
MD5bdc8e86d841795137dc29fa962aa1ee6
SHA16e847883cc6884a8c269adfd19022cbba4be58cd
SHA25673dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA51212ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c
-
Filesize
257KB
MD5c95dc978812b51e1b9aa38c27faf3b1a
SHA170dee9e4f828652f6be927a193be6938bc175ce4
SHA2564bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA5125202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0
-
Filesize
21B
MD524db7359a3bd3947b750594af0f959f6
SHA10d2e88bef39c2ae1329f3635dff2302cfbb5166d
SHA256fe8c8dbe1ae7bf180b15f0a1df407c6e8243f5bbbe3adba04fabad3c2ae353fa
SHA512eac1585ab7cbd647f3f716a2b8d1ac58d767d1584a7cc246234d6722cca9eedacf14d25d3246006e8e1de39bd1786a2adb39b0f27097c676fae984a6e9f3e8e6
-
Filesize
51B
MD5e9e508e658f21f2bb876ac9b8571b6c7
SHA1ef04ecfd7e8a9fb6158eecca184f9701d4af590e
SHA256366dedf5655e0ba9a58215af6cee3560a977f53b0c144303eed117c2db6dfe5c
SHA51228af91593a4ff02660dbe94f2ef33f2ba1ab5a652c4191c0e47b297a5b31293d399537f400f091b630281e9f97f928a42cb6c87b82290f31127ef491715cad4a
-
Filesize
1KB
MD5e51d9a67a0772cb93d2228337d058730
SHA10929002a5c5c735e0f1d50c84b37d05c3f287b7a
SHA256490ebc0bb9a26373e079eb0697df7aed38deb2e68350b243c030dfb5f83a19bb
SHA51253bfce0d7055cf48f72c27a8e28b738abbdce2545a588e9f6fe0f01216f6380d8da471f1f1367317e82830cc210d5a1215db5a1e7851e969ea05135a7b564ced