Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09/07/2020, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
majicmanx.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
majicmanx.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
majicmanx.exe
-
Size
916KB
-
MD5
45f5d816b57bdc68d6f1533b434f107c
-
SHA1
01d0562b549b16040d9f12039f4cbecb4b1381fe
-
SHA256
969f04b01704c53893ba3a53a22c96c860b9a4f3784c7e79ec07210cc7e244f3
-
SHA512
5e83930fc912bba4272ee7cadebf0cc7b2c21ffc66307bd035f2edebfd02e7fb1690069520fec99fdc65630719d60916af12f129289d489941e59a7ef3f54be5
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1100 majicmanx.exe 1144 majicmanx.exe 1144 majicmanx.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1100 set thread context of 1144 1100 majicmanx.exe 24 PID 1144 set thread context of 1300 1144 majicmanx.exe 20 PID 820 set thread context of 1300 820 cmd.exe 20 -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1300 Explorer.EXE 1300 Explorer.EXE 1300 Explorer.EXE 1300 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1144 majicmanx.exe Token: SeDebugPrivilege 820 cmd.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1300 Explorer.EXE 1300 Explorer.EXE 1300 Explorer.EXE 1300 Explorer.EXE 1300 Explorer.EXE -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\KV1HBN_H16 = "C:\\Program Files (x86)\\Cuxe\\msolg4l2e.exe" cmd.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1144 1100 majicmanx.exe 24 PID 1100 wrote to memory of 1144 1100 majicmanx.exe 24 PID 1100 wrote to memory of 1144 1100 majicmanx.exe 24 PID 1100 wrote to memory of 1144 1100 majicmanx.exe 24 PID 1300 wrote to memory of 820 1300 Explorer.EXE 25 PID 1300 wrote to memory of 820 1300 Explorer.EXE 25 PID 1300 wrote to memory of 820 1300 Explorer.EXE 25 PID 1300 wrote to memory of 820 1300 Explorer.EXE 25 PID 820 wrote to memory of 1384 820 cmd.exe 26 PID 820 wrote to memory of 1384 820 cmd.exe 26 PID 820 wrote to memory of 1384 820 cmd.exe 26 PID 820 wrote to memory of 1384 820 cmd.exe 26 PID 820 wrote to memory of 432 820 cmd.exe 31 PID 820 wrote to memory of 432 820 cmd.exe 31 PID 820 wrote to memory of 432 820 cmd.exe 31 PID 820 wrote to memory of 432 820 cmd.exe 31 PID 820 wrote to memory of 432 820 cmd.exe 31 -
description ioc Process Key created \Registry\User\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1100 majicmanx.exe 1144 majicmanx.exe 1144 majicmanx.exe 1144 majicmanx.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe 820 cmd.exe -
Deletes itself 1 IoCs
pid Process 1384 cmd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Cuxe\msolg4l2e.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SendNotifyMessage
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Checks whether UAC is enabled
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\majicmanx.exe"C:\Users\Admin\AppData\Local\Temp\majicmanx.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\majicmanx.exe"C:\Users\Admin\AppData\Local\Temp\majicmanx.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
PID:1144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- Drops file in Program Files directory
PID:820 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\majicmanx.exe"3⤵
- Deletes itself
PID:1384
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:432
-
-