Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2023, 19:02

General

  • Target

    22c01b7578a08bca00538e4ec79017b9_magniber_metamorfo_JC.exe

  • Size

    13.4MB

  • MD5

    22c01b7578a08bca00538e4ec79017b9

  • SHA1

    1bef95f8aca9fda4ddc60169e2f0090d1dd9870f

  • SHA256

    a5a80d71b2400f77bfed6d717f0152c82d6463d26f43efa83dfa469704923497

  • SHA512

    3b2bd864b36bb9a3ba517fa92461dc171b19552ce61dfd966ed28b59aa1e67c2819a5e01746923f369d1cc0bde2c0be519a02034577adfc8fb04213a67a24031

  • SSDEEP

    196608:aDipKmSIydNdjFeckbxv43cM/7AZyKrqNXaUQGX42RN/j:aDipKccdjoWV/crqNK/GX//j

Score
4/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22c01b7578a08bca00538e4ec79017b9_magniber_metamorfo_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\22c01b7578a08bca00538e4ec79017b9_magniber_metamorfo_JC.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Soda PDF Desktop 14\Installation\PlayaSDK\PlayaSDK.dll

    Filesize

    960KB

    MD5

    11a813c0972b740937d3a7e2daf9ffcb

    SHA1

    4245b5a3c97f725c56a29d745767edebb5e3f15d

    SHA256

    3f933bced2d9f65d48f7c48715bf286fd431341a74e1ce15d39b7c4c96603cf9

    SHA512

    9a590dcab0cf7051d04743736ea7a6b74fa0f87539580cc41a58ad33a76574201e7b6d54d5100cbcd262266bc55b053243edd4860a2d43deeb1c164395e4a941