Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe
-
Size
151KB
-
MD5
d5a43b4aafb075f95106e57de2b7ecf4
-
SHA1
44fd1ab2d88ccf4cc68c9ea0eb5caea5e2e72721
-
SHA256
3d61202f9e3cc3c033bfee04ce1ad74f734aac24aeb4f72a6611b6db46f08d43
-
SHA512
bba6c42de21af442b7de4482a2542bfc593394e79ff55c066332e30b2dd21f4f736a60fb0d9461e174d7f04f796bfd6130cab13965fce2751cadbc805cebcb57
-
SSDEEP
1536:lVwvLO1zPAihVLrdrbUkgtwYRvKWzXzpa5JF7ErTwXHE24iS333ulpiNIgmBzNMT:3r1cWI8i05JurTwXU/ulPgc9qz+9+++7
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe -
Deletes itself 1 IoCs
pid Process 2712 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2540 winmgr.exe 2812 winmgr.exe -
Loads dropped DLL 3 IoCs
pid Process 2040 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 2040 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 2540 winmgr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50502979739026720652860250\\winmgr.exe" 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50502979739026720652860250\\winmgr.exe" 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2176 set thread context of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2540 set thread context of 2812 2540 winmgr.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-50502979739026720652860250\winmgr.exe 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe File opened for modification C:\Windows\M-50502979739026720652860250\winmgr.exe 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe File opened for modification C:\Windows\M-50502979739026720652860250 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2176 wrote to memory of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2176 wrote to memory of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2176 wrote to memory of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2176 wrote to memory of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2176 wrote to memory of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2176 wrote to memory of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2176 wrote to memory of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2176 wrote to memory of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2176 wrote to memory of 2040 2176 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 28 PID 2040 wrote to memory of 2712 2040 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 29 PID 2040 wrote to memory of 2712 2040 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 29 PID 2040 wrote to memory of 2712 2040 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 29 PID 2040 wrote to memory of 2712 2040 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 29 PID 2040 wrote to memory of 2540 2040 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 31 PID 2040 wrote to memory of 2540 2040 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 31 PID 2040 wrote to memory of 2540 2040 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 31 PID 2040 wrote to memory of 2540 2040 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 31 PID 2540 wrote to memory of 2812 2540 winmgr.exe 32 PID 2540 wrote to memory of 2812 2540 winmgr.exe 32 PID 2540 wrote to memory of 2812 2540 winmgr.exe 32 PID 2540 wrote to memory of 2812 2540 winmgr.exe 32 PID 2540 wrote to memory of 2812 2540 winmgr.exe 32 PID 2540 wrote to memory of 2812 2540 winmgr.exe 32 PID 2540 wrote to memory of 2812 2540 winmgr.exe 32 PID 2540 wrote to memory of 2812 2540 winmgr.exe 32 PID 2540 wrote to memory of 2812 2540 winmgr.exe 32 PID 2540 wrote to memory of 2812 2540 winmgr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe"2⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\emhpaugtos.bat" "3⤵
- Deletes itself
PID:2712
-
-
C:\Windows\M-50502979739026720652860250\winmgr.exeC:\Windows\M-50502979739026720652860250\winmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\M-50502979739026720652860250\winmgr.exeC:\Windows\M-50502979739026720652860250\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD52b6a9b9f56b0cdec40b034887a14cf89
SHA1ea4552f950d49d0cc167bc7b8d9ebb29b94c58fe
SHA2568cddabe3a8c2d95101d55c65fb57bbe40627615727590d216bf8e2947cc452a4
SHA512b07b0322e01894729a011f77789f35c0738278dcda2f21a28d42ad4587b0ca251504c04abd123d27b6730d9270b766069905577a6658c1e789aac0b2a0fd16f8
-
Filesize
151KB
MD5d5a43b4aafb075f95106e57de2b7ecf4
SHA144fd1ab2d88ccf4cc68c9ea0eb5caea5e2e72721
SHA2563d61202f9e3cc3c033bfee04ce1ad74f734aac24aeb4f72a6611b6db46f08d43
SHA512bba6c42de21af442b7de4482a2542bfc593394e79ff55c066332e30b2dd21f4f736a60fb0d9461e174d7f04f796bfd6130cab13965fce2751cadbc805cebcb57