Analysis
-
max time kernel
135s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 00:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe
-
Size
9.3MB
-
MD5
4a1aac3b42abe51d19cabf18ff07afec
-
SHA1
89ff71b5724c06543b4d66a6d53dab7fbeeb14e2
-
SHA256
39442170c9b041c9427921f8487048223df175cddb49e4ec1eac0aec73a8a3d3
-
SHA512
323e7ff099e493bb9fef82e53bd6c12abf0939e4424dd8d743d8ccf247cf0bf7216778ab082b15e25ed2d77a5af90bc1c6cc85aa76a377e0953a14a9311ccfe7
-
SSDEEP
196608:i07GZG9+0U5Ezm26RJ6DK4hz4pUjQJret7UOr/SleCbeCGYYfE:iiGZG9+0U5EOTUsUhr/QT+YYfE
Malware Config
Signatures
-
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\SystemCertificates\TrustedPublisher\Certificates\0BB8456503E5E222FB8C0EC65CCA0DF92A5DC804\Blob = 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 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Vera.exe = "11000" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe -
Modifies registry class 38 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\open\command 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\open\command\Old_DelegateExecute = "{17FE9752-0B5A-4665-84CD-569794602F5C}" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shellex\IconHandler\ = "{928e15a5-147c-34cb-8576-61dd60cb9fd8}" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\edit\command 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\open\command\DelegateExecute 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shellex\IconHandler\ = "{928e15a5-147c-34cb-8576-61dd60cb9fd8}" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\edit\command 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\opennew\command\OldDefault = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" %1" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\opennew\command\ = "\"Vera.exe\" --open \"%1\"" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shellex 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\edit 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\opennew\command 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shellex\IconHandler 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\edit 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\open 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\open\command\OldDefault = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" %1" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\open 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\opennew\command 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shellex\IconHandler 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\edit\command\OldDefault = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\opennew\command\ = "\"Vera.exe\" --open \"%1\"" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\opennew 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\opennew\command\Old_DelegateExecute = "{17FE9752-0B5A-4665-84CD-569794602F5C}" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\opennew\command\DelegateExecute 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\open\command\ = "\"Vera.exe\" --open \"%1\"" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\open\command\DelegateExecute 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\edit\command\ = "\"Vera.exe\" --open \"%1\"" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\open\command 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\open\command\ = "\"Vera.exe\" --open \"%1\"" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shellex 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shell\edit\command\ = "\"Vera.exe\" --open \"%1\"" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\htmlfile\shellex\IconHandler\OldDefault = "{42042206-2D85-11D3-8CFF-005004838597}" 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\opennew 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Undecided\shell\opennew\command\DelegateExecute 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\SystemCertificates\TrustedPublisher\Certificates\0BB8456503E5E222FB8C0EC65CCA0DF92A5DC804 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\SystemCertificates\TrustedPublisher\Certificates\0BB8456503E5E222FB8C0EC65CCA0DF92A5DC804\Blob = 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 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1620 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe 1620 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1620 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe 1620 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1620 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe 1620 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe 1620 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe 1620 2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe"1⤵
- Manipulates Digital Signatures
- Modifies Internet Explorer settings
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1620
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2596