Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 19:49

General

  • Target

    2024-02-20_e07757b46afc01c47a06d74134b78891_magniber.exe

  • Size

    70.3MB

  • MD5

    e07757b46afc01c47a06d74134b78891

  • SHA1

    60061d4bf6efb9a99982b2509283f17746687625

  • SHA256

    48f4527be1344fa36c0082b402c9db9b5fc67b4ad23105f041bcf1c0cbbf0541

  • SHA512

    73c40e3082a70a4b38e75190842c2a38d4f44cee4c4796f52caedc6aa8cbda1bf4dd7cd00b462c5fd927e4ef9b81e41b7aee459a312dc6e47467b2ab2a428d56

  • SSDEEP

    1572864:RprHe/6QDu0XUAcnt0qDwmp9hjCW6vKTmh4KerU7daqpfJ6JSRBL5CLyFhfG:RVy652qDF1AMvKerUXeJSRBL1FU

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_e07757b46afc01c47a06d74134b78891_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_e07757b46afc01c47a06d74134b78891_magniber.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • Loads dropped DLL
    • Modifies system certificate store
    PID:220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{D15A7516-41C1-46d9-B0E5-FB560549DB95}-TemporaryCache\360NetUL.dll

    Filesize

    231KB

    MD5

    6c2cd3003689a373b158a4f8c6fe75a7

    SHA1

    f4938a64224b9cfc16920a83b4cb9ef83c8b68ff

    SHA256

    a7ff68fe983f3fc97efcd0970e3f93952658420290a3e3d1cec97a2e0bfa83ed

    SHA512

    8a89da3786bcc7b2936e090a35b51fe59fa37c5b80bac5fd471777b9068a79b8f46bdeaf22f8d5be8bf47a3e1e239366f04ea1fb49c2233526bd1ea545960bd0

  • C:\Users\Admin\AppData\Local\Temp\{E3856B5E-82FA-4a7d-92E3-47A270034A62}-TemporaryCache\7z.dll

    Filesize

    1.1MB

    MD5

    f0fef6362d4886e85a186a5e3766650a

    SHA1

    65843b7052a4d1b84762479d79445c46834e18b5

    SHA256

    15b9fe7d408cbf2204039087526e7df947df57b42ea479e303b682e956638816

    SHA512

    3f6dfd701cf62b77219f8825a2257c4bd7d44ebafc5654b06abaf906ced2571f4eeb04fe22ae6136c14bddebddb12555aa6efd322e779443d57bb122ea786043