Malware Analysis Report

2024-10-18 22:05

Sample ID 240616-vxs15avamk
Target 2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber
SHA256 c99976e7cd34a63e91cc90e782db0b39254749ea0cb1c8d0499408fa64cd6da0
Tags
bootkit persistence
score
6/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
6/10

SHA256

c99976e7cd34a63e91cc90e782db0b39254749ea0cb1c8d0499408fa64cd6da0

Threat Level: Shows suspicious behavior

The file 2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber was found to be: Shows suspicious behavior.

Malicious Activity Summary

bootkit persistence

Checks for any installed AV software in registry

Writes to the Master Boot Record (MBR)

Loads dropped DLL

Executes dropped EXE

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of FindShellTrayWindow

Checks processor information in registry

Modifies system certificate store

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-16 17:22

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-16 17:22

Reported

2024-06-16 17:25

Platform

win7-20240611-en

Max time kernel

118s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe"

Signatures

Checks for any installed AV software in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avast Software\Avast C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "e99461ba-e2b0-426a-b7c2-d8bc5fc1c777" C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "e99461ba-e2b0-426a-b7c2-d8bc5fc1c777" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "e99461ba-e2b0-426a-b7c2-d8bc5fc1c777" C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAANIUL1Sb0UEqt7N7lpF+FgQQAAAACAAAAAAAQZgAAAAEAACAAAAAxMTYDcSn/puDliIUMP3kKoaEQC2DdvK1upEk/ZG2AZQAAAAAOgAAAAAIAACAAAADHQXegtONupPoNMCZTjE3G5FCozHa56JOw88XgArIObzAAAAAdU6mzLjE2dUTIeF+RqQSrU2CC5vF1xmuVmCOHWND91+ISUbWjyoKK6EfFbrfUrttAAAAAZwxvAYNKgbSppcCYD8U9gdfQ3+JIM8aFKMfN0QdzxyVqZqLM4aSw6gK0LpG1HIzk30MfdzHN1Pi2oONNWa1H3Q==" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2416 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe
PID 2416 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe
PID 2416 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe
PID 2416 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe
PID 2700 wrote to memory of 3000 N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe
PID 2700 wrote to memory of 3000 N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe
PID 2700 wrote to memory of 3000 N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe
PID 2700 wrote to memory of 2852 N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe
PID 2700 wrote to memory of 2852 N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe
PID 2700 wrote to memory of 2852 N/A C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe"

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\icarus-info.xml /install /sssid:2416

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe /sssid:2416 /er_master:master_ep_088b598e-65e8-41c2-ad0d-9678eda1875f /er_ui:ui_ep_7627f217-038d-4aec-8ff7-6526dcdbb369

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus.exe /sssid:2416 /er_master:master_ep_088b598e-65e8-41c2-ad0d-9678eda1875f /er_ui:ui_ep_7627f217-038d-4aec-8ff7-6526dcdbb369 /er_slave:avg-tu_slave_ep_b9881080-b563-4b30-aa0f-989ff2de8efc /slave:avg-tu

Network

Country Destination Domain Proto
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 shepherd.avcdn.net udp
US 34.160.176.28:443 shepherd.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 honzik.avcdn.net udp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp

Files

\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus.exe

MD5 97856ab19be2842f985c899ccde7e312
SHA1 4b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA256 2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512 b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

C:\ProgramData\AVG\Icarus\Logs\sfx.log

MD5 a6063ece07e7e3599514662115b9e0bb
SHA1 1e0b2cc7c917dd0b5e7a898b85455d36e11ccfd2
SHA256 8768f5cf11e09c43f3d385256a02b723ba3a2c6c5b10e4a9516233099ebc5450
SHA512 4221b3684c3e6fc6962195aa2b2b6e63d7f56e2ef3c75f73b07cbeba1a4af2f8265aca0d063c40f76476f68577125274bae7f8f29c3abea504ec771bb131f262

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\eref.edat

MD5 e9e508e658f21f2bb876ac9b8571b6c7
SHA1 ef04ecfd7e8a9fb6158eecca184f9701d4af590e
SHA256 366dedf5655e0ba9a58215af6cee3560a977f53b0c144303eed117c2db6dfe5c
SHA512 28af91593a4ff02660dbe94f2ef33f2ba1ab5a652c4191c0e47b297a5b31293d399537f400f091b630281e9f97f928a42cb6c87b82290f31127ef491715cad4a

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\icarus-info.xml

MD5 0592c9b186af430b7e1df8c3482598eb
SHA1 20de79400f91cc471e7eb2f551dc80667a203465
SHA256 4a517f593c19953fd8e7284717ffe8a2389edda1de55ae6ba492fa4df25110ce
SHA512 c4986fddaad7a43e264688af928a940a19514c0fc0b3e40dc8ad0b1d42051b3bb77c1b6c447119e68b85b150b8b9bb89431cb7724f4ec17501078c780c20a7d8

C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

MD5 168f03c5c241049561d93853fa2304dc
SHA1 ee086aa5bc60436a75015003cb2dd27ae57620ff
SHA256 374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e
SHA512 169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179

C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

MD5 53a3565f3222bb953ddaaeb661ccaf12
SHA1 ea46b6cb7de812f461764b691b3773ca2c461c9e
SHA256 ece2df841891599c31dacdcb41c47d10c7853d280a3cae7b2b0516e23ba6701b
SHA512 acc6cff54c139095bd0bdff47a225135395ce8bf0453fd527feb58b5a9397bd0696d2009690287d7ee8b0c7000b767939f53dbcef00fbe6e75b799070b87f4ef

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\icarus_ui.exe

MD5 7ebae16a6ea514e55f7160c3539261cc
SHA1 ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256 f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512 f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\product-info.xml

MD5 bdc8e86d841795137dc29fa962aa1ee6
SHA1 6e847883cc6884a8c269adfd19022cbba4be58cd
SHA256 73dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA512 12ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\ecoo.edat

MD5 24db7359a3bd3947b750594af0f959f6
SHA1 0d2e88bef39c2ae1329f3635dff2302cfbb5166d
SHA256 fe8c8dbe1ae7bf180b15f0a1df407c6e8243f5bbbe3adba04fabad3c2ae353fa
SHA512 eac1585ab7cbd647f3f716a2b8d1ac58d767d1584a7cc246234d6722cca9eedacf14d25d3246006e8e1de39bd1786a2adb39b0f27097c676fae984a6e9f3e8e6

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\setupui.cont

MD5 c95dc978812b51e1b9aa38c27faf3b1a
SHA1 70dee9e4f828652f6be927a193be6938bc175ce4
SHA256 4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA512 5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\dump_process.exe

MD5 c22d80d43019235520344972efec9ff2
SHA1 1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA256 5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512 f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\common\bug_report.exe

MD5 0c0f0ca2bb49dfa3743e9d4156007c70
SHA1 042fdfba346a89a83f0c782117038a82b29a28d1
SHA256 0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512 e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\product-def.xml

MD5 4f70105a30bbb4c3ac6e563f02852e62
SHA1 ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA256 5d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA512 90295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5

C:\ProgramData\AVG\Icarus\Logs\sui.log

MD5 d66fdfaf9aafdc895d52ab793e7c7b96
SHA1 0aa0cb41251230eca89366d6bdcbed54f4aece7d
SHA256 81d64b3f7c571c533a681c0fff0756b7d974da3121129308893d0caa85794ca6
SHA512 8860330317e5091c6c51fd61ebd31cef19638f96a34116ff75b9bf4997e58b3313b1513973f31d9000be443b976683501232376603e20e53259191bed0c83844

C:\ProgramData\AVG\Icarus\Logs\report.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\ProgramData\AVG\Icarus\Logs\icarus.log

MD5 48900e3f07c2af29a233deb3ceef1425
SHA1 327d58da09de37cf27871a252eb026862eb600b2
SHA256 31c8f0d74ca3e538903025b95b03fe869f3ef0388a392a37c8c4675a7f12a4ae
SHA512 6d846b6d694d16027bf76077ece05a01a725f369dff0e700476076045e312900019df4311294672ca114fec8cba473068f3be4924c64859d2ca7895e0a717923

C:\ProgramData\AVG\Icarus\settings\proxy.ini

MD5 b8853a8e6228549b5d3ad97752d173d4
SHA1 cd471a5d57e0946c19a694a6be8a3959cef30341
SHA256 8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512 cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\config.def

MD5 d74cac8e23617717dcbac5d12be7e108
SHA1 573f84282e738e302b822eb9842500bf1b4b3b39
SHA256 a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512 b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052

C:\Windows\Temp\asw-1420fff0-b448-404c-b5e2-bbf46e340f81\avg-tu\icarus_product.dll

MD5 2f8931c51ebbe01d0c1d87d5ad2d652f
SHA1 a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256 add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA512 2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890

memory/3000-94-0x000007FFFFF70000-0x000007FFFFF80000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-16 17:22

Reported

2024-06-16 17:25

Platform

win10v2004-20240611-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe"

Signatures

Checks for any installed AV software in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avast Software\Avast C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
File opened for modification \??\PhysicalDrive0 C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus_ui.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus_ui.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9fa6f048-2f3f-4b4d-b7a2-3ad83d85215c" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9fa6f048-2f3f-4b4d-b7a2-3ad83d85215c" C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAnHM29NDJvUeqBeCWlEOrbgQAAAACAAAAAAAQZgAAAAEAACAAAADckKRoeUkPqB9cn5x4ueEqLe7CiWb4BH/3Lqd1OgdlUgAAAAAOgAAAAAIAACAAAABtMvSgH4x8vPdoQnp2I7AtoJjDBtHOzri9JUlooX7j+jAAAAChS0DjVeicLs0tx8QhY/cN8BRXW+E4vfvXEAAC69/BMCbAa/Mw2viAN7jHbCuzgqBAAAAAsdh1guUhXuY3gb6k2RdPRuCViG2+pklULpjfjfESx1aILkNOXPx0BgTHYQ697peXP9HndnZi/EVqvWfukQixPQ==" C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "9fa6f048-2f3f-4b4d-b7a2-3ad83d85215c" C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus_ui.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus_ui.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-16_a7b4b48175c0cf24595e0bf6876ff047_magniber.exe"

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\icarus-info.xml /install /sssid:412

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus_ui.exe

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus_ui.exe /sssid:412 /er_master:master_ep_446d3dcb-eaa5-4cd7-9d9e-1163474c0135 /er_ui:ui_ep_36fd5a80-1726-4085-83cc-6277e57667df

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus.exe /sssid:412 /er_master:master_ep_446d3dcb-eaa5-4cd7-9d9e-1163474c0135 /er_ui:ui_ep_36fd5a80-1726-4085-83cc-6277e57667df /er_slave:avg-tu_slave_ep_7f12a5be-b1b8-4a88-a1d8-3f6ea1cf5108 /slave:avg-tu

Network

Country Destination Domain Proto
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 honzik.avcdn.net udp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 74.113.220.23.in-addr.arpa udp
US 8.8.8.8:53 223.223.117.34.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
BE 88.221.83.225:443 www.bing.com tcp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 225.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 shepherd.avcdn.net udp
US 34.160.176.28:443 shepherd.avcdn.net tcp
US 8.8.8.8:53 28.176.160.34.in-addr.arpa udp
US 8.8.8.8:53 honzik.avcdn.net udp
US 8.8.8.8:53 honzik.avcdn.net udp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 23.220.113.74:443 honzik.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 analytics.avcdn.net udp
US 34.117.223.223:443 analytics.avcdn.net tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 196.131.50.23.in-addr.arpa udp
US 8.8.8.8:53 145.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 6.173.189.20.in-addr.arpa udp

Files

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus.exe

MD5 97856ab19be2842f985c899ccde7e312
SHA1 4b33ff3baeba3b61ee040b1d00ebff0531cc21ef
SHA256 2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514
SHA512 b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

C:\ProgramData\AVG\Icarus\Logs\sfx.log

MD5 54ad48304dbe18e89856ddf8df8d4eb7
SHA1 6172c8ec31a1f83c1d9a5d1cb1f70f75ed9a7512
SHA256 1e187bc76243673802336284852e4bb1806d15af7f8a6ab0bb2524a3bb562892
SHA512 28eec9cff2e6545031cad3b30970b626e79d6592fe5d02be765af521027e0d16a7bf265fd449d3df89286cfe4ae093165facf184ba8094073b37af4f906a6604

C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

MD5 f79bed2e595a92512e2205639352049d
SHA1 18a25f15331375da7916b809c64c32c831022384
SHA256 49406063ecabcca340375a509470baf12627cf22daf875a2491fcf5f7dc11b75
SHA512 cfe42b7c426f39e6e4e8dc481663f8e907fe8e5138371a22459eceec9c8dfbef3ef8d2404e3f80cf80c6ad9d649cff548a178e39535ab6f59680337856458d7a

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\eref.edat

MD5 e9e508e658f21f2bb876ac9b8571b6c7
SHA1 ef04ecfd7e8a9fb6158eecca184f9701d4af590e
SHA256 366dedf5655e0ba9a58215af6cee3560a977f53b0c144303eed117c2db6dfe5c
SHA512 28af91593a4ff02660dbe94f2ef33f2ba1ab5a652c4191c0e47b297a5b31293d399537f400f091b630281e9f97f928a42cb6c87b82290f31127ef491715cad4a

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\icarus-info.xml

MD5 e51d9a67a0772cb93d2228337d058730
SHA1 0929002a5c5c735e0f1d50c84b37d05c3f287b7a
SHA256 490ebc0bb9a26373e079eb0697df7aed38deb2e68350b243c030dfb5f83a19bb
SHA512 53bfce0d7055cf48f72c27a8e28b738abbdce2545a588e9f6fe0f01216f6380d8da471f1f1367317e82830cc210d5a1215db5a1e7851e969ea05135a7b564ced

C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

MD5 168f03c5c241049561d93853fa2304dc
SHA1 ee086aa5bc60436a75015003cb2dd27ae57620ff
SHA256 374d172fa5910a136fd3adba14744e6f740efc9dd62e34f870ea5698e349f60e
SHA512 169897b850ad3fa154452c34b87813f31723914110bf41e711c614e18b9850d036a2083cf908286a406d45db1c4a51f3b320792672b3287cfca08e756b5ee179

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\icarus_ui.exe

MD5 7ebae16a6ea514e55f7160c3539261cc
SHA1 ae74b3af4926b6932aea68a32c7c8727d53a94e7
SHA256 f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9
SHA512 f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\product-info.xml

MD5 bdc8e86d841795137dc29fa962aa1ee6
SHA1 6e847883cc6884a8c269adfd19022cbba4be58cd
SHA256 73dc254c937d42f2cfa42c983df343969d59d6ef671d0b9bfcc95ce9e797e86b
SHA512 12ad0d7090caabfa3d4c25bdee5a9a0b09787631451d73de5f9a71404f39c955d46a78779af111ce333ad246246b56a64d712dfd5ee8117c3259273aba1ec96c

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\ecoo.edat

MD5 24db7359a3bd3947b750594af0f959f6
SHA1 0d2e88bef39c2ae1329f3635dff2302cfbb5166d
SHA256 fe8c8dbe1ae7bf180b15f0a1df407c6e8243f5bbbe3adba04fabad3c2ae353fa
SHA512 eac1585ab7cbd647f3f716a2b8d1ac58d767d1584a7cc246234d6722cca9eedacf14d25d3246006e8e1de39bd1786a2adb39b0f27097c676fae984a6e9f3e8e6

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\setupui.cont

MD5 c95dc978812b51e1b9aa38c27faf3b1a
SHA1 70dee9e4f828652f6be927a193be6938bc175ce4
SHA256 4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0
SHA512 5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\dump_process.exe

MD5 c22d80d43019235520344972efec9ff2
SHA1 1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc
SHA256 5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0
SHA512 f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\common\bug_report.exe

MD5 0c0f0ca2bb49dfa3743e9d4156007c70
SHA1 042fdfba346a89a83f0c782117038a82b29a28d1
SHA256 0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea
SHA512 e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\product-def.xml

MD5 4f70105a30bbb4c3ac6e563f02852e62
SHA1 ff5c730804a6d4c4806f82848e6a38c6dc9f07c9
SHA256 5d06d8b936bfefeb3d0abfe5b37ad6dbb154d87696b7081b69bdc88af282e1e0
SHA512 90295b97d8bdf8fd4b55fbafa9eba1e8751af9d4c95e795bd22684c81fab9fc7a53399fdbf301a1520a42d361765017e25721bc5f953921907b957ba01c648e5

C:\ProgramData\AVG\Icarus\Logs\sui.log

MD5 181261a23b7fdd08262bf176f54895d9
SHA1 5cfa1dca954fe1a65c72663910847cadeba83ed7
SHA256 94da205c1ece7b2448406ae719ea2864966c8534e6480815e4e7293fddacf8a6
SHA512 b32994a4bf3d8863e2c3284c9b72fc5a30105dc4c79514cf546fa38f597bf5bf83bccc7276c64caa5be9ab5b21598e50b32a8b33df3aeeb7f0e15bdc343af140

C:\ProgramData\AVG\Icarus\Logs\report.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\ProgramData\AVG\Icarus\Logs\icarus.log

MD5 7b40b01b917bf2dae927642f94c5251b
SHA1 da3083c3e1e418c83e57463981b5c15d620a9971
SHA256 7a0e361f1b9e999d9981c3eed1cd5fff1b5f8724bdfd9e96e858d897528534a9
SHA512 425ca0bbbac07f4c46f3fded41c1e5780b191099e67b8d3e2706e25f1f3cf9048ef7c6fe13f7a87f7f22bfd073965fc3af5327c0e24ab3ae81f7056e77f9051b

C:\ProgramData\AVG\Icarus\settings\proxy.ini

MD5 b8853a8e6228549b5d3ad97752d173d4
SHA1 cd471a5d57e0946c19a694a6be8a3959cef30341
SHA256 8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9
SHA512 cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\icarus_product.dll

MD5 2f8931c51ebbe01d0c1d87d5ad2d652f
SHA1 a322fec62bbfe4d8b46199bc9001b4af74bbaf93
SHA256 add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd
SHA512 2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890

C:\Windows\Temp\asw-0826e741-1fa7-4125-aa56-ed8839b8bd43\avg-tu\config.def

MD5 d74cac8e23617717dcbac5d12be7e108
SHA1 573f84282e738e302b822eb9842500bf1b4b3b39
SHA256 a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b
SHA512 b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052