Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    160s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2023, 11:20

General

  • Target

    2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe

  • Size

    317KB

  • MD5

    2393f21a726d7e759d2afe6316246a1b

  • SHA1

    dae73f33c93974ee64c863a305b3fe2a4efa242a

  • SHA256

    872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

  • SHA512

    2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

  • SSDEEP

    3072:JNxkchM4eJY+kPsSNxq8RPCUek4pZhzVrZ+Nm+5XNtOCfUY8dQgZCocgtgVsN6ff:b/hM4em+kPsgzr4PZSRfUmSNN67l2

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\2023-08-26_2393f21a726d7e759d2afe6316246a1b_magniber_JC.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wypafeorcf.bat" "
        3⤵
          PID:2996
        • C:\Windows\M-5050572947025827857375865240\winmgr.exe
          C:\Windows\M-5050572947025827857375865240\winmgr.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2988
          • C:\Windows\M-5050572947025827857375865240\winmgr.exe
            C:\Windows\M-5050572947025827857375865240\winmgr.exe
            4⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            PID:1404

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\phqghumeay

      Filesize

      318KB

      MD5

      b07fed4bdc1e2d79999a1a4f31f5ed83

      SHA1

      281d19b6521984112fae58b1a63ef0e0c2869a16

      SHA256

      894ddece4dc02ea9f68db06e666dee6b63b87ebada8eb0c086bea5c0802425a0

      SHA512

      c7aac372c7e226300a92e776dc00d5331eb62104a242eb0e23b797cedf47c87eab7c0a7ec4dc12e96a54eff7819a8c116330b5c84468cabdbe2acfafd94eb005

    • C:\Users\Admin\AppData\Local\Temp\wypafeorcf.bat

      Filesize

      284B

      MD5

      71de58f01670ce2a3fc6cbc47729aff6

      SHA1

      78ea1f5300dcd2e5ac0c6873d6fb61a75fd6936e

      SHA256

      3c2db8fb630730abecda41f9cb71fdb3474be3101a5f94c07d42ea2181419744

      SHA512

      7a579b325990aeb59000829ad3c081ed5edf2e88bb176e3b31da971c361b66107c43e12f8683be2e7f0929d19122fbd4ff4cac1252b0fc4adf0fa2149d3371cc

    • C:\Windows\M-5050572947025827857375865240\winmgr.exe

      Filesize

      317KB

      MD5

      2393f21a726d7e759d2afe6316246a1b

      SHA1

      dae73f33c93974ee64c863a305b3fe2a4efa242a

      SHA256

      872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

      SHA512

      2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

    • C:\Windows\M-5050572947025827857375865240\winmgr.exe

      Filesize

      317KB

      MD5

      2393f21a726d7e759d2afe6316246a1b

      SHA1

      dae73f33c93974ee64c863a305b3fe2a4efa242a

      SHA256

      872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

      SHA512

      2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

    • C:\Windows\M-5050572947025827857375865240\winmgr.exe

      Filesize

      317KB

      MD5

      2393f21a726d7e759d2afe6316246a1b

      SHA1

      dae73f33c93974ee64c863a305b3fe2a4efa242a

      SHA256

      872eef06f010972090cb6ec242571c4abf6ab515f682fdc0b207b54f4688b986

      SHA512

      2c4275aece691349ec6fbfb749a4684dc1c355b6ddee53a4a1d63d94d6886a08516a5c2276aa7882dcfc8b0a264c8bf8e11a3a67e06ffaf36cc7dea5522545c7

    • memory/1404-23-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1404-24-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/1404-26-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/2484-5-0x0000000003000000-0x000000000305C000-memory.dmp

      Filesize

      368KB

    • memory/2484-0-0x0000000003000000-0x000000000305C000-memory.dmp

      Filesize

      368KB

    • memory/2484-2-0x0000000000420000-0x0000000000520000-memory.dmp

      Filesize

      1024KB

    • memory/2988-22-0x0000000003000000-0x000000000305C000-memory.dmp

      Filesize

      368KB

    • memory/2988-19-0x00000000005C0000-0x00000000006C0000-memory.dmp

      Filesize

      1024KB

    • memory/4204-7-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/4204-6-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/4204-3-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB