Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23-09-2023 11:20
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe
-
Size
317KB
-
MD5
2393f21a726d7e759d2afe6316246a1b
-
SHA1
dae73f33c93974ee64c863a305b3fe2a4efa242a
-
SHA256
872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986
-
SHA512
2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7
-
SSDEEP
3072:JNxkchM4eJY+kPsSNxq8RPCUek4pZhzVrZ+Nm+5XNtOCfUY8dQgZCocgtgVsN6ff:b/hM4em+kPsgzr4PZSRfUmSNN67l2
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe -
Deletes itself 1 IoCs
pid Process 1736 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1020 winmgr.exe 2772 winmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2168 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 2168 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-5050572947025827857375865240\\winmgr.exe" 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-5050572947025827857375865240\\winmgr.exe" 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2416 set thread context of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 1020 set thread context of 2772 1020 winmgr.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-5050572947025827857375865240\winmgr.exe 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe File opened for modification C:\Windows\M-5050572947025827857375865240\winmgr.exe 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe File opened for modification C:\Windows\M-5050572947025827857375865240 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 2416 wrote to memory of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 2416 wrote to memory of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 2416 wrote to memory of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 2416 wrote to memory of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 2416 wrote to memory of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 2416 wrote to memory of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 2416 wrote to memory of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 2416 wrote to memory of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 2416 wrote to memory of 2168 2416 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 28 PID 2168 wrote to memory of 1736 2168 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 29 PID 2168 wrote to memory of 1736 2168 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 29 PID 2168 wrote to memory of 1736 2168 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 29 PID 2168 wrote to memory of 1736 2168 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 29 PID 2168 wrote to memory of 1020 2168 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 30 PID 2168 wrote to memory of 1020 2168 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 30 PID 2168 wrote to memory of 1020 2168 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 30 PID 2168 wrote to memory of 1020 2168 2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe 30 PID 1020 wrote to memory of 2772 1020 winmgr.exe 32 PID 1020 wrote to memory of 2772 1020 winmgr.exe 32 PID 1020 wrote to memory of 2772 1020 winmgr.exe 32 PID 1020 wrote to memory of 2772 1020 winmgr.exe 32 PID 1020 wrote to memory of 2772 1020 winmgr.exe 32 PID 1020 wrote to memory of 2772 1020 winmgr.exe 32 PID 1020 wrote to memory of 2772 1020 winmgr.exe 32 PID 1020 wrote to memory of 2772 1020 winmgr.exe 32 PID 1020 wrote to memory of 2772 1020 winmgr.exe 32 PID 1020 wrote to memory of 2772 1020 winmgr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe"2⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\mxkymtwepd.bat" "3⤵
- Deletes itself
PID:1736
-
-
C:\Windows\M-5050572947025827857375865240\winmgr.exeC:\Windows\M-5050572947025827857375865240\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\M-5050572947025827857375865240\winmgr.exeC:\Windows\M-5050572947025827857375865240\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2772
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284B
MD5dd842eebea1e4ff048a31ffcb0ae31f9
SHA19444c58ca011119dfd8d7e1fbb0cf48a55c06994
SHA2562b6357e207ec69e66433f30b4c6b8851d74dd48627f3bd762abae975d40e50f7
SHA5123c4c7b3184414e066f3490f31f0a644c9768f5e0d53592274029d58116a740be35a3e5141a76cd93db1aa6c0f32d83886162b13c826bae7c9e4fe42be46cb24b
-
Filesize
284B
MD5dd842eebea1e4ff048a31ffcb0ae31f9
SHA19444c58ca011119dfd8d7e1fbb0cf48a55c06994
SHA2562b6357e207ec69e66433f30b4c6b8851d74dd48627f3bd762abae975d40e50f7
SHA5123c4c7b3184414e066f3490f31f0a644c9768f5e0d53592274029d58116a740be35a3e5141a76cd93db1aa6c0f32d83886162b13c826bae7c9e4fe42be46cb24b
-
Filesize
317KB
MD52393f21a726d7e759d2afe6316246a1b
SHA1dae73f33c93974ee64c863a305b3fe2a4efa242a
SHA256872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986
SHA5122c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7
-
Filesize
317KB
MD52393f21a726d7e759d2afe6316246a1b
SHA1dae73f33c93974ee64c863a305b3fe2a4efa242a
SHA256872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986
SHA5122c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7
-
Filesize
317KB
MD52393f21a726d7e759d2afe6316246a1b
SHA1dae73f33c93974ee64c863a305b3fe2a4efa242a
SHA256872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986
SHA5122c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7
-
Filesize
317KB
MD52393f21a726d7e759d2afe6316246a1b
SHA1dae73f33c93974ee64c863a305b3fe2a4efa242a
SHA256872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986
SHA5122c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7
-
Filesize
317KB
MD52393f21a726d7e759d2afe6316246a1b
SHA1dae73f33c93974ee64c863a305b3fe2a4efa242a
SHA256872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986
SHA5122c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7
-
Filesize
317KB
MD52393f21a726d7e759d2afe6316246a1b
SHA1dae73f33c93974ee64c863a305b3fe2a4efa242a
SHA256872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986
SHA5122c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7