Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe
-
Size
151KB
-
MD5
d5a43b4aafb075f95106e57de2b7ecf4
-
SHA1
44fd1ab2d88ccf4cc68c9ea0eb5caea5e2e72721
-
SHA256
3d61202f9e3cc3c033bfee04ce1ad74f734aac24aeb4f72a6611b6db46f08d43
-
SHA512
bba6c42de21af442b7de4482a2542bfc593394e79ff55c066332e30b2dd21f4f736a60fb0d9461e174d7f04f796bfd6130cab13965fce2751cadbc805cebcb57
-
SSDEEP
1536:lVwvLO1zPAihVLrdrbUkgtwYRvKWzXzpa5JF7ErTwXHE24iS333ulpiNIgmBzNMT:3r1cWI8i05JurTwXU/ulPgc9qz+9+++7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe -
Executes dropped EXE 2 IoCs
pid Process 1604 winmgr.exe 3540 winmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50502979739026720652860250\\winmgr.exe" 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50502979739026720652860250\\winmgr.exe" 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5068 set thread context of 1300 5068 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 93 PID 1604 set thread context of 3540 1604 winmgr.exe 102 -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\createdump.exe winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\createdump.exe winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.IO.Compression.ZipFile.dll winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\createdump.exe winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\createdump.exe winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\System.IO.Compression.ZipFile.dll winmgr.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-50502979739026720652860250\winmgr.exe 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe File opened for modification C:\Windows\M-50502979739026720652860250\winmgr.exe 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe File opened for modification C:\Windows\M-50502979739026720652860250 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5068 wrote to memory of 1300 5068 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 93 PID 5068 wrote to memory of 1300 5068 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 93 PID 5068 wrote to memory of 1300 5068 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 93 PID 5068 wrote to memory of 1300 5068 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 93 PID 5068 wrote to memory of 1300 5068 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 93 PID 5068 wrote to memory of 1300 5068 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 93 PID 5068 wrote to memory of 1300 5068 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 93 PID 5068 wrote to memory of 1300 5068 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 93 PID 5068 wrote to memory of 1300 5068 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 93 PID 1300 wrote to memory of 3616 1300 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 94 PID 1300 wrote to memory of 3616 1300 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 94 PID 1300 wrote to memory of 3616 1300 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 94 PID 1300 wrote to memory of 1604 1300 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 95 PID 1300 wrote to memory of 1604 1300 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 95 PID 1300 wrote to memory of 1604 1300 2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe 95 PID 1604 wrote to memory of 3540 1604 winmgr.exe 102 PID 1604 wrote to memory of 3540 1604 winmgr.exe 102 PID 1604 wrote to memory of 3540 1604 winmgr.exe 102 PID 1604 wrote to memory of 3540 1604 winmgr.exe 102 PID 1604 wrote to memory of 3540 1604 winmgr.exe 102 PID 1604 wrote to memory of 3540 1604 winmgr.exe 102 PID 1604 wrote to memory of 3540 1604 winmgr.exe 102 PID 1604 wrote to memory of 3540 1604 winmgr.exe 102 PID 1604 wrote to memory of 3540 1604 winmgr.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-26_d5a43b4aafb075f95106e57de2b7ecf4_magniber.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jynarvzjiu.bat" "3⤵PID:3616
-
-
C:\Windows\M-50502979739026720652860250\winmgr.exeC:\Windows\M-50502979739026720652860250\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\M-50502979739026720652860250\winmgr.exeC:\Windows\M-50502979739026720652860250\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3540
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD546c7470517fc38f76069686c9547a1df
SHA1aa16c25dd515285f51719f5c821b0b447c7eef47
SHA256a49fc9e20cfad3b21c269d0e78ceb3c99a1fc6394a0481f44b839262064f7c6c
SHA512280822d9617a0c7b6f76fdfbac91fe433340e1735537af21de59f4bc44648331f3275a78d15b6ad3ad4cc1155b55a0c72737937119cc4c77b7789da669a231c9
-
Filesize
153KB
MD524ca5d00878259c255449289f7b09ebb
SHA1c43ae97bd9e16fd761a5d0283dea1a7bd7d70ddf
SHA2560ed6404f1fcdf531d52fe78c14f658fa223dd2aa73bfa96723a55b90a9652933
SHA512e888c3d25333bcb7ff25533fa77fa22bb62bcdce92e31f0bd6c50095979e3b1c810c22cd1a04dd61344d68f68e89b3572d19ab8280f9b58d6e469c325c584f3e
-
Filesize
151KB
MD5d5a43b4aafb075f95106e57de2b7ecf4
SHA144fd1ab2d88ccf4cc68c9ea0eb5caea5e2e72721
SHA2563d61202f9e3cc3c033bfee04ce1ad74f734aac24aeb4f72a6611b6db46f08d43
SHA512bba6c42de21af442b7de4482a2542bfc593394e79ff55c066332e30b2dd21f4f736a60fb0d9461e174d7f04f796bfd6130cab13965fce2751cadbc805cebcb57