Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe
-
Size
3.8MB
-
MD5
357f5ed6f1f2124eb1bafe166a26de6d
-
SHA1
30546cb222ab1e0bdf8774fca0010002c22f4f4b
-
SHA256
54b26a9b95ed1fcf9f314705326208619c439e9b0d02a51892ed791ef1dabdff
-
SHA512
33df233d4bd6253195af524510299810c6a9b4b96a12dd05f9bdfa1576e17d4025da5daaac65d87a0fb8e04b977db4fedcfd05534676a6a3854ff71dae0f9798
-
SSDEEP
98304:4TgNv5QiVxgbtIM/0cKZP5Cj0qhvcGx6OEKG0cC6g6v66666ES66666E6kD6666l:v/kykj0qh0Gx6gG0cC6g6v66666ES66R
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\msnkgdbx.sys 3FD9.tmp File opened for modification C:\Windows\system32\drivers\msnkgdbx.sys 3FD9.tmp -
Executes dropped EXE 2 IoCs
pid Process 1876 3FC8.tmp.exe 1476 3FD9.tmp -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\sboiaev\lmmwrad.exe 3FD9.tmp File created C:\Windows\system32\sboiaev\lmmwraddrv.sys 3FD9.tmp File created C:\Windows\system32\sboiaev\lmmwrad.sys 3FD9.tmp -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4940 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1476 3FD9.tmp 1476 3FD9.tmp -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4504 wrote to memory of 1876 4504 2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe 85 PID 4504 wrote to memory of 1876 4504 2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe 85 PID 4504 wrote to memory of 1876 4504 2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe 85 PID 4504 wrote to memory of 1476 4504 2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe 86 PID 4504 wrote to memory of 1476 4504 2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe 86 PID 4504 wrote to memory of 1476 4504 2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe 86 PID 1476 wrote to memory of 4940 1476 3FD9.tmp 87 PID 1476 wrote to memory of 4940 1476 3FD9.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_357f5ed6f1f2124eb1bafe166a26de6d_magniber.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\3FC8.tmp.exeC:\Users\Admin\AppData\Local\Temp\3FC8.tmp.exe2⤵
- Executes dropped EXE
PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\3FD9.tmpC:\Users\Admin\AppData\Local\Temp\3FD9.tmp -insta2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start gzskt3⤵
- Launches sc.exe
PID:4940
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5b9faa132cf40132007a0ea1591ddf187
SHA14918ee962a60eb230b151e4e6d8f1edeb9754bcb
SHA2568e219991a3e5132e365f1c079a4985bc2fb187abaca634eec49f62005e254596
SHA512baec7e4064444e4f137b1ad7c4ddb0409bc1e0ea1dfd69fd323d05a213e2a0b24dc21fcf3aad6d3508e1d6803402b10276d82ec11a3fec304a51d6b82631fb46
-
Filesize
2.7MB
MD5d7e202580243743ae6838ae3e1363074
SHA1e4dae68e0152f23417c826158e990ef8edf1c2ea
SHA256397ea3319c50a3a623aa0cd9415c39001565836b794cc607e9353648cb250d0b
SHA512b8174639e4e768f722a3b4ce24a4cd36c470ca5aa991e05429f958a975ecd59624da79f6ec2d4b325073bb31081af099efb9d33f7ebbb6c4c61e05468db9ddac