Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    31/03/2024, 11:44

General

  • Target

    2024-03-31_cfe3c5d7be1b71bc6cc4c9b944a6dc54_magniber.exe

  • Size

    27.5MB

  • MD5

    cfe3c5d7be1b71bc6cc4c9b944a6dc54

  • SHA1

    e66a13f9f1230f344968f657e53d17a91af82ec2

  • SHA256

    a9dd6c8ae44116a361b3ecbf2158d6ab92a4696858f72a3502fadccf5519b338

  • SHA512

    746f733e3f9610e3401c4e6090a6179cd07b9e98c9d0c278c6e13f2e99d226dcd21ef631dab17bafc96b5dbeb45ecfbb5a10256ccf415870df0e79ff37380f5c

  • SSDEEP

    786432:wioV8Rw7hhT9Yor0/xynXN6zBHVrh1Zs8aU6TA4bG:wioV8RkhhT9YorUydmry87yG

Score
9/10

Malware Config

Signatures

  • Detects executables packed with VMProtect. 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-31_cfe3c5d7be1b71bc6cc4c9b944a6dc54_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-31_cfe3c5d7be1b71bc6cc4c9b944a6dc54_magniber.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 392
      2⤵
      • Program crash
      PID:2744

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1756-0-0x0000000000120000-0x0000000000121000-memory.dmp

          Filesize

          4KB

        • memory/1756-2-0x0000000000120000-0x0000000000121000-memory.dmp

          Filesize

          4KB

        • memory/1756-4-0x0000000000120000-0x0000000000121000-memory.dmp

          Filesize

          4KB

        • memory/1756-5-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB

        • memory/1756-7-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB

        • memory/1756-9-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB

        • memory/1756-12-0x0000000000180000-0x0000000000181000-memory.dmp

          Filesize

          4KB

        • memory/1756-14-0x0000000000180000-0x0000000000181000-memory.dmp

          Filesize

          4KB

        • memory/1756-17-0x0000000000190000-0x0000000000191000-memory.dmp

          Filesize

          4KB

        • memory/1756-19-0x0000000000190000-0x0000000000191000-memory.dmp

          Filesize

          4KB

        • memory/1756-22-0x00000000001A0000-0x00000000001A1000-memory.dmp

          Filesize

          4KB

        • memory/1756-24-0x0000000000390000-0x000000000216E000-memory.dmp

          Filesize

          29.9MB

        • memory/1756-25-0x00000000001A0000-0x00000000001A1000-memory.dmp

          Filesize

          4KB

        • memory/1756-30-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/1756-28-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/1756-33-0x0000000000390000-0x000000000216E000-memory.dmp

          Filesize

          29.9MB