Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    23-09-2023 11:20

General

  • Target

    2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe

  • Size

    317KB

  • MD5

    2393f21a726d7e759d2afe6316246a1b

  • SHA1

    dae73f33c93974ee64c863a305b3fe2a4efa242a

  • SHA256

    872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

  • SHA512

    2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

  • SSDEEP

    3072:JNxkchM4eJY+kPsSNxq8RPCUek4pZhzVrZ+Nm+5XNtOCfUY8dQgZCocgtgVsN6ff:b/hM4em+kPsgzr4PZSRfUmSNN67l2

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe"
      2⤵
      • Modifies security service
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\mxkymtwepd.bat" "
        3⤵
        • Deletes itself
        PID:1736
      • C:\Windows\M-5050572947025827857375865240\winmgr.exe
        C:\Windows\M-5050572947025827857375865240\winmgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1020
        • C:\Windows\M-5050572947025827857375865240\winmgr.exe
          C:\Windows\M-5050572947025827857375865240\winmgr.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\mxkymtwepd.bat

    Filesize

    284B

    MD5

    dd842eebea1e4ff048a31ffcb0ae31f9

    SHA1

    9444c58ca011119dfd8d7e1fbb0cf48a55c06994

    SHA256

    2b6357e207ec69e66433f30b4c6b8851d74dd48627f3bd762abae975d40e50f7

    SHA512

    3c4c7b3184414e066f3490f31f0a644c9768f5e0d53592274029d58116a740be35a3e5141a76cd93db1aa6c0f32d83886162b13c826bae7c9e4fe42be46cb24b

  • C:\Users\Admin\AppData\Local\Temp\mxkymtwepd.bat

    Filesize

    284B

    MD5

    dd842eebea1e4ff048a31ffcb0ae31f9

    SHA1

    9444c58ca011119dfd8d7e1fbb0cf48a55c06994

    SHA256

    2b6357e207ec69e66433f30b4c6b8851d74dd48627f3bd762abae975d40e50f7

    SHA512

    3c4c7b3184414e066f3490f31f0a644c9768f5e0d53592274029d58116a740be35a3e5141a76cd93db1aa6c0f32d83886162b13c826bae7c9e4fe42be46cb24b

  • C:\Windows\M-5050572947025827857375865240\winmgr.exe

    Filesize

    317KB

    MD5

    2393f21a726d7e759d2afe6316246a1b

    SHA1

    dae73f33c93974ee64c863a305b3fe2a4efa242a

    SHA256

    872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

    SHA512

    2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

  • C:\Windows\M-5050572947025827857375865240\winmgr.exe

    Filesize

    317KB

    MD5

    2393f21a726d7e759d2afe6316246a1b

    SHA1

    dae73f33c93974ee64c863a305b3fe2a4efa242a

    SHA256

    872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

    SHA512

    2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

  • C:\Windows\M-5050572947025827857375865240\winmgr.exe

    Filesize

    317KB

    MD5

    2393f21a726d7e759d2afe6316246a1b

    SHA1

    dae73f33c93974ee64c863a305b3fe2a4efa242a

    SHA256

    872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

    SHA512

    2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

  • C:\Windows\M-5050572947025827857375865240\winmgr.exe

    Filesize

    317KB

    MD5

    2393f21a726d7e759d2afe6316246a1b

    SHA1

    dae73f33c93974ee64c863a305b3fe2a4efa242a

    SHA256

    872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

    SHA512

    2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

  • \Windows\M-5050572947025827857375865240\winmgr.exe

    Filesize

    317KB

    MD5

    2393f21a726d7e759d2afe6316246a1b

    SHA1

    dae73f33c93974ee64c863a305b3fe2a4efa242a

    SHA256

    872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

    SHA512

    2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

  • \Windows\M-5050572947025827857375865240\winmgr.exe

    Filesize

    317KB

    MD5

    2393f21a726d7e759d2afe6316246a1b

    SHA1

    dae73f33c93974ee64c863a305b3fe2a4efa242a

    SHA256

    872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

    SHA512

    2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

  • memory/1020-29-0x0000000003000000-0x000000000305C000-memory.dmp

    Filesize

    368KB

  • memory/1020-39-0x0000000003000000-0x000000000305C000-memory.dmp

    Filesize

    368KB

  • memory/1020-32-0x00000000005F0000-0x00000000006F0000-memory.dmp

    Filesize

    1024KB

  • memory/2168-27-0x00000000021F0000-0x000000000224C000-memory.dmp

    Filesize

    368KB

  • memory/2168-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2168-10-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2168-9-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2168-6-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2416-0-0x0000000003000000-0x000000000305C000-memory.dmp

    Filesize

    368KB

  • memory/2416-5-0x0000000001F60000-0x0000000001FBC000-memory.dmp

    Filesize

    368KB

  • memory/2416-3-0x0000000000390000-0x0000000000490000-memory.dmp

    Filesize

    1024KB

  • memory/2416-8-0x0000000003000000-0x000000000305C000-memory.dmp

    Filesize

    368KB

  • memory/2772-42-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB