Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02-04-2024 11:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe
-
Size
5.4MB
-
MD5
cae2db2545f69055470d5c6251347292
-
SHA1
36a32b468671cde5e60c25bc441347d1ffb4ab58
-
SHA256
6b2d4b26116a05b9b22acac60c3cd161ecbac4148b0a11da5cdc556c719e866d
-
SHA512
e23d73a7252d53a53fb5a185a1ab29ebc328d14d2b4122c13c1cc4b4d534e47bb00a0a806879da568c2a56f206e07a4cd7e2ffd6aac580cd338bd99c3f3a712c
-
SSDEEP
98304:ACQ3TpNKyp29plZSMVXS+ZuEkZ0bc90tJ3+9C3UAm0Hc4gz:ACkNKG29pjzH5k2brYh0Hiz
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23C550C2-5C84-377A-9E9D-46249DFE8FCA}\InProcServer32\ThreadingModel = "Apartment" 2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23C550C2-5C84-377A-9E9D-46249DFE8FCA} 2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23C550C2-5C84-377A-9E9D-46249DFE8FCA}\ = "User Notification" 2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23C550C2-5C84-377A-9E9D-46249DFE8FCA}\AppID = "{0010890e-8789-413c-adbc-48f5b511b3af}" 2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23C550C2-5C84-377A-9E9D-46249DFE8FCA}\InProcServer32 2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{23C550C2-5C84-377A-9E9D-46249DFE8FCA}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shell32.dll" 2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2912 2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe Token: SeIncBasePriorityPrivilege 2912 2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-02_cae2db2545f69055470d5c6251347292_magniber.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2912