Analysis
-
max time kernel
162s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 02:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe
-
Size
5.4MB
-
MD5
d40f484e42344e80f33b086974c960e5
-
SHA1
435209f34bd2368b0f99981d731ae7c02b31f4f1
-
SHA256
6441f71fabb6bfc51ae69ed5029abd3093291c7fc31ca16d7f820f193d8875c0
-
SHA512
eeee5906961a771fcf8caf6a9899f76255add0d79b58c89ecbd3335b73a8333b0f3ee272bba839baecf838371a18ec59322a506af0823bb5d14ff96e8f1350af
-
SSDEEP
98304:xwFC+e1UOteFp0IpTX/RCwF9tpyB96TrBhxCheHd00X08pT:xwFC9fteU56rpkUBhxC8HCm
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/3000-24-0x0000000000400000-0x00000000011A4000-memory.dmp UPX behavioral2/memory/3000-26-0x0000000000400000-0x00000000011A4000-memory.dmp UPX behavioral2/memory/3000-28-0x0000000000400000-0x00000000011A4000-memory.dmp UPX behavioral2/memory/3000-33-0x0000000000400000-0x00000000011A4000-memory.dmp UPX -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\ = "SSPWorkspace Class" 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\InProcServer32\ = "C:\\Windows\\SysWOW64\\tsworkspace.dll" 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\ProgID 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\VersionIndependentProgID 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\VersionIndependentProgID\ = "SSPWorkspace" 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39} 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\InProcServer32 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\InProcServer32\ThreadingModel = "Apartment" 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\ProgID\ = "SSPWorkspace.1" 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\TypeLib 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9EF5725D-1198-1361-A97F-3D0AAB164C39}\TypeLib\ = "{94A67BDD-80F7-4E36-A15D-E8B08806A7AD}" 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3000 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Token: SeIncBasePriorityPrivilege 3000 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Token: 33 3000 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe Token: SeIncBasePriorityPrivilege 3000 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3000 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98 PID 3492 wrote to memory of 3000 3492 2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_d40f484e42344e80f33b086974c960e5_magniber.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3748 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:3952