Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 23:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe
-
Size
5.6MB
-
MD5
df2f485fc043a139fefba9ee829d8560
-
SHA1
f0aea6860d91a6823a22339cf68902ec0973e1ec
-
SHA256
fdbcccf2b0029c5b7d11692bf2946cb08dbec87d9ead657761636c584981f97e
-
SHA512
599963d241c80d80d0d5c7289316cd46b1bba30b3d3940d5e72c1594fde9931967b63655309a2d66f9eb3fa5510a066bd39e914a7cc99b7435019dbbafbffd02
-
SSDEEP
98304:ubRubWdH2AYGZTqi6Ge+/wDLf2ehsGAFYSxq/YvkRgDdc60iHn:ubRuqgChKf2eh/zSxs8kac5o
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A1EB459-33CE-E38D-CA10-A7477339B087} 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A1EB459-33CE-E38D-CA10-A7477339B087}\InprocServer32 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A1EB459-33CE-E38D-CA10-A7477339B087}\InprocServer32\Assembly = "Microsoft.Office.Interop.Access, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A1EB459-33CE-E38D-CA10-A7477339B087}\InprocServer32\Class = "Microsoft.Office.Interop.Access.CodeDataClass" 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A1EB459-33CE-E38D-CA10-A7477339B087}\InprocServer32\RuntimeVersion = "v2.0.50727" 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A1EB459-33CE-E38D-CA10-A7477339B087}\InprocServer32\14.0.0.0 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A1EB459-33CE-E38D-CA10-A7477339B087}\InprocServer32\14.0.0.0\Assembly = "Microsoft.Office.Interop.Access, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A1EB459-33CE-E38D-CA10-A7477339B087}\InprocServer32\14.0.0.0\Class = "Microsoft.Office.Interop.Access.CodeDataClass" 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A1EB459-33CE-E38D-CA10-A7477339B087}\InprocServer32\14.0.0.0\RuntimeVersion = "v2.0.50727" 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2280 2676 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe 27 PID 2676 wrote to memory of 2280 2676 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe 27 PID 2676 wrote to memory of 2280 2676 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe 27 PID 2676 wrote to memory of 2280 2676 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe 27 PID 2676 wrote to memory of 2280 2676 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe 27 PID 2676 wrote to memory of 2280 2676 2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_df2f485fc043a139fefba9ee829d8560_magniber.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
PID:2280
-