Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_8e639e1c37dfc1a635d07a6c0bd7b021_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_8e639e1c37dfc1a635d07a6c0bd7b021_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_8e639e1c37dfc1a635d07a6c0bd7b021_magniber.exe
-
Size
6.1MB
-
MD5
8e639e1c37dfc1a635d07a6c0bd7b021
-
SHA1
1de4ec0052ef4328bd28323cc6e6c26a23fc705f
-
SHA256
2826e61c73315203c830b70e9f2dbc578895d5af361237c0d03eee5bb52c9c72
-
SHA512
631aa8effc32d1c81ec513d41b21a5bce815123596a46e0c7f6691adbb280e84d01a3cc4ab0af2d9058ab69fb6ae2c4bf5aa8f2737837dbc034e06cbca2a2908
-
SSDEEP
98304:+t+ww48YTRGrjsYrXa1PSELk/GEAUfZ82ub8GRprbGJ1y1xWcdGWLpDi5PdjDJiN:+xaELkaUfdOMeXdVlG5Fp+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3752 2024-04JGbA5.exe -
Executes dropped EXE 1 IoCs
pid Process 3752 2024-04JGbA5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3752 2024-04JGbA5.exe 3752 2024-04JGbA5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2988 2024-02-19_8e639e1c37dfc1a635d07a6c0bd7b021_magniber.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 3752 2988 2024-02-19_8e639e1c37dfc1a635d07a6c0bd7b021_magniber.exe 84 PID 2988 wrote to memory of 3752 2988 2024-02-19_8e639e1c37dfc1a635d07a6c0bd7b021_magniber.exe 84 PID 2988 wrote to memory of 3752 2988 2024-02-19_8e639e1c37dfc1a635d07a6c0bd7b021_magniber.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_8e639e1c37dfc1a635d07a6c0bd7b021_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_8e639e1c37dfc1a635d07a6c0bd7b021_magniber.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\2024-04JGbA5.exe"2024-04JGbA5.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5321c75578f0671c474adf78a03b01358
SHA1a42703a8f045a00f11e5608096a9e669db8f3bf2
SHA256e575b6f79ffd70e3964ddcf3ed900ea4957fff8caa5bcd7cdd6051ec94ca3da5
SHA5121093642a364e3adf4df454e5f6a48b3425f23520adb2edceb15bd9ef0da39b55ed4fee28796483c738078f595032b8708094902f1d9a166f1bafb91beca68f4e
-
Filesize
5.8MB
MD52260bd24b6ae42cbef6510a9d545bc21
SHA101298b5f6640982841da8ed039d07b70ba1773d8
SHA2560b015f8d4ef641abd5991625bef4594f9772689ff11d1ff787ce165a922e70e9
SHA51270828d7918c70636e72e50224b5d10d74559a60ac1a15f60ceed221282fb41cb1d06fddb052eb3fac13f37283166715e7e3c26df42c23873ee72822bc5746395
-
Filesize
19B
MD5baf81296ec1e502618d5921515eb0225
SHA1daf1b8a0977480acae3a346abce4e5c3e4b369a5
SHA256f961f3f194b2ec9b091c7e9be3541f2d665127e5c7dea4b56a7d12a05a462eaa
SHA512a3e5aee546fcffd58d8ba86d4fd004f21609fd65d4b6ddff78df93d2fcbe3a47a97b2a5a5f9e1692065acecd572ab4b460165d92fd3c95c8a0d1410f2b877113