Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2023 19:38
Static task
static1
Behavioral task
behavioral1
Sample
7686d6c953fd167bebe5d9939b2d79ef_magniber_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7686d6c953fd167bebe5d9939b2d79ef_magniber_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
7686d6c953fd167bebe5d9939b2d79ef_magniber_JC.exe
-
Size
3.0MB
-
MD5
7686d6c953fd167bebe5d9939b2d79ef
-
SHA1
95b390c5d27851ecd480a8b6cafec21cd7230e74
-
SHA256
4881b8c4dd7041d5aa6a684be5fed8657408fed2ec0a3390ae0cdcec56da8f42
-
SHA512
1795162faf69574fefa0a0cdd301b354e81c5b38894315d0defacb54d579faae3f4c14e74ee88dae806572767e046bda9579a23970b86f3fb98a147afaba14fe
-
SSDEEP
49152:NhGVclIdwupANq1PpJ/zCYCnhEpHL2JjUgOsXF0ZEz5bWAN3XpIN:ccOdw27dpJ/zNChE5e/z
Malware Config
Extracted
aresloader
http://193.233.134.57
Signatures
-
AresLoader
AresLoader is a loader and downloader written in C++.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ipinfo.io 7 ipinfo.io -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3264 7686d6c953fd167bebe5d9939b2d79ef_magniber_JC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3264 wrote to memory of 1764 3264 7686d6c953fd167bebe5d9939b2d79ef_magniber_JC.exe 82 PID 3264 wrote to memory of 1764 3264 7686d6c953fd167bebe5d9939b2d79ef_magniber_JC.exe 82 PID 3264 wrote to memory of 1764 3264 7686d6c953fd167bebe5d9939b2d79ef_magniber_JC.exe 82 PID 1764 wrote to memory of 5032 1764 cmd.exe 84 PID 1764 wrote to memory of 5032 1764 cmd.exe 84 PID 1764 wrote to memory of 5032 1764 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7686d6c953fd167bebe5d9939b2d79ef_magniber_JC.exe"C:\Users\Admin\AppData\Local\Temp\7686d6c953fd167bebe5d9939b2d79ef_magniber_JC.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c tzutil /g2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\tzutil.exetzutil /g3⤵PID:5032
-
-