Analysis
-
max time kernel
5s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 16:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe
-
Size
19.2MB
-
MD5
2e47762ed5f94ac03e28a9408398842f
-
SHA1
d1b3d61b967c88013323d469b9ca06758a6fb8b3
-
SHA256
f18612de64687383f0e5a85bd805cc602615c9ba78563743c1e38ecbe643391a
-
SHA512
dcae7637e20e2caee4f47aaa050202ffad694c49766adcea647606168d954cc25184af41d1cff4c37dd4b0a014b1141759eb014d6596927e2f8fba752b5da5d2
-
SSDEEP
393216:OaVp4ReDeM+kkza+hsEEfhFxw1Rs8gRebKR/aN0CEzp0t:Fp4UF+h6hzwTsHeGR/HCEt4
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DB94BC87-0C5F-98A1-8BB6-715F27474639} 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DB94BC87-0C5F-98A1-8BB6-715F27474639}\InprocServer32 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DB94BC87-0C5F-98A1-8BB6-715F27474639}\InprocServer32\ThreadingModel = "Both" 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DB94BC87-0C5F-98A1-8BB6-715F27474639}\ProgID 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DB94BC87-0C5F-98A1-8BB6-715F27474639}\VersionIndependentProgID\ = "ADODB.Recordset" 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DB94BC87-0C5F-98A1-8BB6-715F27474639}\ = "ADODB.Recordset" 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DB94BC87-0C5F-98A1-8BB6-715F27474639}\InprocServer32\ = "%CommonProgramFiles(x86)%\\System\\ado\\msado15.dll" 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DB94BC87-0C5F-98A1-8BB6-715F27474639}\ProgID\ = "ADODB.Recordset.6.0" 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DB94BC87-0C5F-98A1-8BB6-715F27474639}\VersionIndependentProgID 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1820 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe Token: SeIncBasePriorityPrivilege 1820 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1820 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe 1820 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe 1820 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe 1820 2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_2e47762ed5f94ac03e28a9408398842f_magniber.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1820 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD53bfc2a5dae9019a500cbcbc5a739c793
SHA19f89fb984df87a49d2fe66071e89dde0e9fb6e5b
SHA256480809de10f4c712730115486b3b5fcf36a0ba423aa55be3bd2499a10a1ec682
SHA512d6dc3b43bbf35f13b965e56bb922ca1d92ec17dd7398d058cb8d6f204e86b67b2301f53413b2e80424f58a52b27d51235ed4527909333decf6145a5851157311