Analysis
-
max time kernel
152s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe
-
Size
204KB
-
MD5
e335d2ab929291abade22368ffb7fcb4
-
SHA1
03cf0cd0453ba4713fee88e3b1f12c398c38173f
-
SHA256
e78793e09ec9d0623a17df051a1290eeb1999f52e38435da017aefa5ce97a617
-
SHA512
23099fc6a659f553e8a303a0269a4f43eefdc931362937a28271b3d874b6739cd35549e46e2a4970795bb8cbb2c5560c2c7f1c3ce589a5f56e46f6135a2738ea
-
SSDEEP
3072:oqEo7L4ueEp6Bxf3IbgFPJipLgaJ5R56AtCw9THbmQ6h6pxMJJgZOiUZBqZShF:HEaLjp6Bybjb5+AhHbmpJJyQ
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe -
Deletes itself 1 IoCs
pid Process 2308 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2164 winmgr.exe 2936 winmgr.exe -
Loads dropped DLL 3 IoCs
pid Process 2480 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 2480 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 2164 winmgr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-5050572947025827857375865240\\winmgr.exe" 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-5050572947025827857375865240\\winmgr.exe" 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3040 set thread context of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 2164 set thread context of 2936 2164 winmgr.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\M-5050572947025827857375865240\winmgr.exe 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe File opened for modification C:\Windows\M-5050572947025827857375865240 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe File created C:\Windows\M-5050572947025827857375865240\winmgr.exe 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 3040 wrote to memory of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 3040 wrote to memory of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 3040 wrote to memory of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 3040 wrote to memory of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 3040 wrote to memory of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 3040 wrote to memory of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 3040 wrote to memory of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 3040 wrote to memory of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 3040 wrote to memory of 2480 3040 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 28 PID 2480 wrote to memory of 2308 2480 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 29 PID 2480 wrote to memory of 2308 2480 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 29 PID 2480 wrote to memory of 2308 2480 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 29 PID 2480 wrote to memory of 2308 2480 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 29 PID 2480 wrote to memory of 2164 2480 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 31 PID 2480 wrote to memory of 2164 2480 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 31 PID 2480 wrote to memory of 2164 2480 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 31 PID 2480 wrote to memory of 2164 2480 2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe 31 PID 2164 wrote to memory of 2936 2164 winmgr.exe 32 PID 2164 wrote to memory of 2936 2164 winmgr.exe 32 PID 2164 wrote to memory of 2936 2164 winmgr.exe 32 PID 2164 wrote to memory of 2936 2164 winmgr.exe 32 PID 2164 wrote to memory of 2936 2164 winmgr.exe 32 PID 2164 wrote to memory of 2936 2164 winmgr.exe 32 PID 2164 wrote to memory of 2936 2164 winmgr.exe 32 PID 2164 wrote to memory of 2936 2164 winmgr.exe 32 PID 2164 wrote to memory of 2936 2164 winmgr.exe 32 PID 2164 wrote to memory of 2936 2164 winmgr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_e335d2ab929291abade22368ffb7fcb4_magniber_JC.exe"2⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\waizcglvui.bat" "3⤵
- Deletes itself
PID:2308
-
-
C:\Windows\M-5050572947025827857375865240\winmgr.exeC:\Windows\M-5050572947025827857375865240\winmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\M-5050572947025827857375865240\winmgr.exeC:\Windows\M-5050572947025827857375865240\winmgr.exe4⤵
- Executes dropped EXE
PID:2936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284B
MD5a82fa0b71a7c4b0597baa2f540eb9701
SHA1053f85f97217313bf3774c1813c2409f9fba43b6
SHA2567406ec074ca015cf429f90aac6262ff9b5b51c00042d7cdcdd0308bbcef77427
SHA51243e9522a2c835d2067de559790e713c1bd5ddffdb8563d8dd1b8a6ab0368ae547d0f700595aac65109921959d142ae970e14bda9f70850aaee03bb4e8d62f858
-
Filesize
284B
MD5a82fa0b71a7c4b0597baa2f540eb9701
SHA1053f85f97217313bf3774c1813c2409f9fba43b6
SHA2567406ec074ca015cf429f90aac6262ff9b5b51c00042d7cdcdd0308bbcef77427
SHA51243e9522a2c835d2067de559790e713c1bd5ddffdb8563d8dd1b8a6ab0368ae547d0f700595aac65109921959d142ae970e14bda9f70850aaee03bb4e8d62f858
-
Filesize
204KB
MD5e335d2ab929291abade22368ffb7fcb4
SHA103cf0cd0453ba4713fee88e3b1f12c398c38173f
SHA256e78793e09ec9d0623a17df051a1290eeb1999f52e38435da017aefa5ce97a617
SHA51223099fc6a659f553e8a303a0269a4f43eefdc931362937a28271b3d874b6739cd35549e46e2a4970795bb8cbb2c5560c2c7f1c3ce589a5f56e46f6135a2738ea
-
Filesize
204KB
MD5e335d2ab929291abade22368ffb7fcb4
SHA103cf0cd0453ba4713fee88e3b1f12c398c38173f
SHA256e78793e09ec9d0623a17df051a1290eeb1999f52e38435da017aefa5ce97a617
SHA51223099fc6a659f553e8a303a0269a4f43eefdc931362937a28271b3d874b6739cd35549e46e2a4970795bb8cbb2c5560c2c7f1c3ce589a5f56e46f6135a2738ea
-
Filesize
204KB
MD5e335d2ab929291abade22368ffb7fcb4
SHA103cf0cd0453ba4713fee88e3b1f12c398c38173f
SHA256e78793e09ec9d0623a17df051a1290eeb1999f52e38435da017aefa5ce97a617
SHA51223099fc6a659f553e8a303a0269a4f43eefdc931362937a28271b3d874b6739cd35549e46e2a4970795bb8cbb2c5560c2c7f1c3ce589a5f56e46f6135a2738ea
-
Filesize
204KB
MD5e335d2ab929291abade22368ffb7fcb4
SHA103cf0cd0453ba4713fee88e3b1f12c398c38173f
SHA256e78793e09ec9d0623a17df051a1290eeb1999f52e38435da017aefa5ce97a617
SHA51223099fc6a659f553e8a303a0269a4f43eefdc931362937a28271b3d874b6739cd35549e46e2a4970795bb8cbb2c5560c2c7f1c3ce589a5f56e46f6135a2738ea
-
Filesize
204KB
MD5e335d2ab929291abade22368ffb7fcb4
SHA103cf0cd0453ba4713fee88e3b1f12c398c38173f
SHA256e78793e09ec9d0623a17df051a1290eeb1999f52e38435da017aefa5ce97a617
SHA51223099fc6a659f553e8a303a0269a4f43eefdc931362937a28271b3d874b6739cd35549e46e2a4970795bb8cbb2c5560c2c7f1c3ce589a5f56e46f6135a2738ea
-
Filesize
204KB
MD5e335d2ab929291abade22368ffb7fcb4
SHA103cf0cd0453ba4713fee88e3b1f12c398c38173f
SHA256e78793e09ec9d0623a17df051a1290eeb1999f52e38435da017aefa5ce97a617
SHA51223099fc6a659f553e8a303a0269a4f43eefdc931362937a28271b3d874b6739cd35549e46e2a4970795bb8cbb2c5560c2c7f1c3ce589a5f56e46f6135a2738ea
-
Filesize
204KB
MD5e335d2ab929291abade22368ffb7fcb4
SHA103cf0cd0453ba4713fee88e3b1f12c398c38173f
SHA256e78793e09ec9d0623a17df051a1290eeb1999f52e38435da017aefa5ce97a617
SHA51223099fc6a659f553e8a303a0269a4f43eefdc931362937a28271b3d874b6739cd35549e46e2a4970795bb8cbb2c5560c2c7f1c3ce589a5f56e46f6135a2738ea