Analysis

  • max time kernel
    135s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 00:44

General

  • Target

    2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe

  • Size

    9.3MB

  • MD5

    4a1aac3b42abe51d19cabf18ff07afec

  • SHA1

    89ff71b5724c06543b4d66a6d53dab7fbeeb14e2

  • SHA256

    39442170c9b041c9427921f8487048223df175cddb49e4ec1eac0aec73a8a3d3

  • SHA512

    323e7ff099e493bb9fef82e53bd6c12abf0939e4424dd8d743d8ccf247cf0bf7216778ab082b15e25ed2d77a5af90bc1c6cc85aa76a377e0953a14a9311ccfe7

  • SSDEEP

    196608:i07GZG9+0U5Ezm26RJ6DK4hz4pUjQJret7UOr/SleCbeCGYYfE:iiGZG9+0U5EOTUsUhr/QT+YYfE

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 38 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_4a1aac3b42abe51d19cabf18ff07afec_magniber_revil.exe"
    1⤵
    • Manipulates Digital Signatures
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1620
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1620-0-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB

    • memory/1620-29-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB