Analysis
-
max time kernel
164s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe
Resource
win7-20240221-en
General
-
Target
2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe
-
Size
1.3MB
-
MD5
821fefdab4e4353bcd93ae8a4e6db32a
-
SHA1
af51c53f8f050419c4f89c954e39edffb04911dd
-
SHA256
1d54aba417990c3d1fc5016be5a8e30f1831f7dde9d54f519ca4e9d6c81a0d42
-
SHA512
b6d890d03315a34331d997709cc0803dbf25101d8a9a0ca3117e3e6aad98d12d267960989f4f2451c357b7473aaa2d2fd05713698689ee7ffdf292793b04a04b
-
SSDEEP
24576:M1JJ3merT5EhVzhBD8uXTTTN+Y1TSZD38VvhYPj5Xl7oDNT5jZ3:ymeaVzrDlXTTTNBTSh3Fj5Ngb9
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4320 alg.exe 4620 DiagnosticsHub.StandardCollector.Service.exe 864 fxssvc.exe 2212 elevation_service.exe 1180 maintenanceservice.exe 1708 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\7ac15937b3e2edcd.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe alg.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe alg.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe 2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe alg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3344 2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe Token: SeAuditPrivilege 864 fxssvc.exe Token: SeDebugPrivilege 4320 alg.exe Token: SeDebugPrivilege 4320 alg.exe Token: SeDebugPrivilege 4320 alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_821fefdab4e4353bcd93ae8a4e6db32a_magniber.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:4620
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3872
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:864
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2212
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1180
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4232 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5bf0a066c69e5b87dc9debada3d88f8c0
SHA1a3445d910dea23a540f020c3c5fe46ee337d8e7a
SHA256c3cd8e46a3ee4458d6dea3f578e79494006e063afbf9d2032204be61f3a9650b
SHA512266f31f1013e1f28ee1c6fedad634916dbe10b278fded30188852eb63e0c8a09fbd95c8aaec038c1b96a1494381b7d4638359e1e595e05682b3871dafc8bd54d
-
Filesize
1.7MB
MD59a6873e12dfbfe6215835cf5143811ce
SHA1b8948c33beea6ee347c12a8753474dff813965b2
SHA25609f15cab06d9b2d7f16762c2dd887721022812fa2f8a1579a43789e18543a70a
SHA512e095ead15939e0647bb5e2c644d68458efa5bc79d819eeb818c56fd7ab60eef23f27964cd4bb0377b59190d6f6b714c9132780fab5cef93498b7fd09e06651f3
-
Filesize
1.7MB
MD5ccb98aa1d14c80d0de4ba66fa7cc5d4b
SHA1e9cd3683ccf03219cb33ef8493abf2897ffeab42
SHA256b841b2f53dd90cd80ed380b46132bf3b60193222693c7cdf23c4a060f44ae4b7
SHA5124f18cf91eb3b05bfda4d4e644d5c82ee25b4c9155d3cef982b6a902d376f0e230485edddaeae5421d6e73ba62492b807aa6b43ae883823b919589f0db9ffa343
-
Filesize
2.1MB
MD58342b6013a9924f0cc96e1db11903213
SHA1741d5acfbea8177a802e660694e2970e34ff1e1a
SHA2564cd679060a0f2104c1bcda6fb58afc01855dadf8f94f8f14a6e3a2088eff5219
SHA512b3c4c443de84ad2570c95cf90184d0b2c3d9ad98200bfb970235c3e44399406fd4c344e52328b55bf0a994c4ab956dda16593d1ac74290af2583825aca8a82cb
-
Filesize
1.6MB
MD50d96f9209b67334c6fa27e7f26f6fcd5
SHA13620e054ba05b8ca0b88c30c5878ce47e2e357f5
SHA256f28e17d660161994d8e532292d1e52e664cff8d3f9b651c24ee0df59606bc475
SHA512e0d5b6aaf1f615d9b6a747ad478dcae3126782a677fae19c17c18b4fbed577c80aea98401eb61bb16c1f91c54aeb711eeac3ae31b151782142dd7e53c0afc53a
-
Filesize
1.2MB
MD5a9c7fffbf2620af2de33c20b34259467
SHA1bf460e48f597d01c3d9efcf7dc29ec9aeb2f4ebe
SHA256e62a73ee2c9df26d6b20d56860a9334312bb7e9f75160f1176baa68d157710d4
SHA512593805b6f10fbeac4b37622f291df02b3f2844d85cd03598e0e67b41cd6ee72418617237448ee63763e6c520b393901186061d07558cd3dfbcae004831be0933
-
Filesize
1.6MB
MD5148eb5af11c49c023f5cdd9304076af7
SHA1782fc61c299e72523a8d4e38b4a8d2e3a3e7da6b
SHA2562f47eaf469c8b9d7fa38c55d2863114cb5b80f1d90c80937d6bfd1afe4969d99
SHA512e36eba00565aa222569a9ad5eaea19eae14cac0dfb79d2cb9dedb8db110865656202739ff2830f05716acb34f9443dde66cb51a9a29433aa9c5db27be382b740
-
Filesize
1.3MB
MD5b4d7bd45a7fc283a3b88e5fe8a5faee8
SHA1474a4ef97c21f90471a6998077830e8128470d4a
SHA256f14fc0b4c77b0aa28896d70bddeae3c9967b9461b1cde665330d0724cc02f3b6
SHA512bf8e652608c35fa89b0e8c18b9be73b677ee0fd3535293cac0386bd08406daeb17cf3b155e198fddf98ce27b2489f75f5ac9365eff319f3ffbddb145d8ae3e74