Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe
-
Size
241KB
-
MD5
9ae71da3cf7706c343bb0d5787ef7b28
-
SHA1
12121e566a3705af95ed81969ede67c2e4771922
-
SHA256
527fb071a29742162f0ce70cfd697b08526a0fba6754dc549015d4c5c05785d8
-
SHA512
5c2381c952e822f1eea3635502a76d64d3df5855550bb0a458aa03445f7b398dac5bbef807780d7f2c32abb1991d62e53a38f2b7fbb104dbf7fa192fc9b6582f
-
SSDEEP
3072:ZLDwYSFDa/vslfqX9hYJiF9xBm2Ef5ayn8Tfd01LqciU+DGZq2CHv5p4HVP0b:NDwYSFZ0hlbynMd01LHZq2xs
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe -
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2812 winmgr.exe 2284 winmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 1224 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 1224 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50505092759023852780284752682408045830\\winmgr.exe" 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50505092759023852780284752682408045830\\winmgr.exe" 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2236 set thread context of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 2812 set thread context of 2284 2812 winmgr.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-50505092759023852780284752682408045830\winmgr.exe 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe File opened for modification C:\Windows\M-50505092759023852780284752682408045830\winmgr.exe 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe File opened for modification C:\Windows\M-50505092759023852780284752682408045830 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 2236 wrote to memory of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 2236 wrote to memory of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 2236 wrote to memory of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 2236 wrote to memory of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 2236 wrote to memory of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 2236 wrote to memory of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 2236 wrote to memory of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 2236 wrote to memory of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 2236 wrote to memory of 1224 2236 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 28 PID 1224 wrote to memory of 2768 1224 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 29 PID 1224 wrote to memory of 2768 1224 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 29 PID 1224 wrote to memory of 2768 1224 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 29 PID 1224 wrote to memory of 2768 1224 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 29 PID 1224 wrote to memory of 2812 1224 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 30 PID 1224 wrote to memory of 2812 1224 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 30 PID 1224 wrote to memory of 2812 1224 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 30 PID 1224 wrote to memory of 2812 1224 2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe 30 PID 2812 wrote to memory of 2284 2812 winmgr.exe 32 PID 2812 wrote to memory of 2284 2812 winmgr.exe 32 PID 2812 wrote to memory of 2284 2812 winmgr.exe 32 PID 2812 wrote to memory of 2284 2812 winmgr.exe 32 PID 2812 wrote to memory of 2284 2812 winmgr.exe 32 PID 2812 wrote to memory of 2284 2812 winmgr.exe 32 PID 2812 wrote to memory of 2284 2812 winmgr.exe 32 PID 2812 wrote to memory of 2284 2812 winmgr.exe 32 PID 2812 wrote to memory of 2284 2812 winmgr.exe 32 PID 2812 wrote to memory of 2284 2812 winmgr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_9ae71da3cf7706c343bb0d5787ef7b28_magniber.exe"2⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wjgsdvgswb.bat" "3⤵
- Deletes itself
PID:2768
-
-
C:\Windows\M-50505092759023852780284752682408045830\winmgr.exeC:\Windows\M-50505092759023852780284752682408045830\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\M-50505092759023852780284752682408045830\winmgr.exeC:\Windows\M-50505092759023852780284752682408045830\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2284
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD52b0a2ee72ad296d4f100cd7e6f09b1d7
SHA1ff63ad27e6cbd4dd9dbdf602d1f1210b6e39b34c
SHA25633bed501df71bc3c43539faefa3efcc2c2e3ee339990eac01ac068e16f971891
SHA51236cd26dca79e8218a8c303ee441b4ebdd3ebde0e289647cf3dc2260f7a99791afbd3325f81c84166056eccf7166779f0c5e010e67b0d151ce5dcac21df0dc29f
-
Filesize
241KB
MD59ae71da3cf7706c343bb0d5787ef7b28
SHA112121e566a3705af95ed81969ede67c2e4771922
SHA256527fb071a29742162f0ce70cfd697b08526a0fba6754dc549015d4c5c05785d8
SHA5125c2381c952e822f1eea3635502a76d64d3df5855550bb0a458aa03445f7b398dac5bbef807780d7f2c32abb1991d62e53a38f2b7fbb104dbf7fa192fc9b6582f