Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-06-2022 03:44

General

  • Target

    Magniber2.msi

  • Size

    10.6MB

  • MD5

    cb152752867af105819552b9086a8c76

  • SHA1

    f8cd1daef2428e9c01af3e1352e694c2f48d6cdf

  • SHA256

    fd5979d5ad2b2d68d7e5508c2d4e0147241e379a9115c0771d8bb56e2692db8c

  • SHA512

    9bcfa1f55d329149b1025dfd68ac3c5045a764427723d1b7b1e690bf973c99756865a0cfbf7dce17a83552562c3c193fb75bdda8b6f7550a6d24297cdf670f81

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Magniber2.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1960
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 03A54671D7748ED4865EC98652998C81
      2⤵
      • Loads dropped DLL
      PID:1704
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2028
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000494" "0000000000000060"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Installer\MSI68B3.tmp

    Filesize

    107KB

    MD5

    5020274a62dd8711387e218ccb4d864e

    SHA1

    a2da2d2a55924e13e46fb3efb42c0b735ec67a27

    SHA256

    10e398018b3973dee2a3ecfefc4e9f2c57c2a6932bbea90e3dc9808ed772d2f7

    SHA512

    775fdc377b949c5e5b3dd667c875878a2affbb2f5d9846afb9d8b511783af7dbaf8f9e7dc7778922bc3133ba5bab2bb3b329c35609803252f9686d7a46a18898

  • \Windows\Installer\MSI68B3.tmp

    Filesize

    107KB

    MD5

    5020274a62dd8711387e218ccb4d864e

    SHA1

    a2da2d2a55924e13e46fb3efb42c0b735ec67a27

    SHA256

    10e398018b3973dee2a3ecfefc4e9f2c57c2a6932bbea90e3dc9808ed772d2f7

    SHA512

    775fdc377b949c5e5b3dd667c875878a2affbb2f5d9846afb9d8b511783af7dbaf8f9e7dc7778922bc3133ba5bab2bb3b329c35609803252f9686d7a46a18898

  • memory/1704-56-0x0000000000000000-mapping.dmp

  • memory/1704-60-0x0000000180000000-0x000000018001E000-memory.dmp

    Filesize

    120KB

  • memory/1960-54-0x000007FEFB871000-0x000007FEFB873000-memory.dmp

    Filesize

    8KB