Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe
-
Size
158KB
-
MD5
5bd5a35cac3ccfcf2bc92bdcbdeaea2b
-
SHA1
92c122fcfb0974dd7db945a158230484ab0d5ea3
-
SHA256
2f77d79ed81700662374f3f87386cb2c9487485a787edfb751766e3d897888ae
-
SHA512
eb62387fe0e53795c1f502ee8929b9624201c60a13ef7e6b01f2b9c3af7c94ce0aab60258370e7d716205303f49df670d8d01c6ea1d2166075f00e2729cf490e
-
SSDEEP
3072:3r1cWI8i05JurTwXU/ulPgc9qz+9+++++++H:b1RJxur8XMQPgyh+++++++H
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe -
Executes dropped EXE 2 IoCs
pid Process 4908 winmgr.exe 1112 winmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50502979739026720652860250\\winmgr.exe" 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50502979739026720652860250\\winmgr.exe" 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2684 set thread context of 4140 2684 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 89 PID 4908 set thread context of 1112 4908 winmgr.exe 95 -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.ZipFile.dll winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.ZipFile.dll winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe winmgr.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-50502979739026720652860250\winmgr.exe 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe File opened for modification C:\Windows\M-50502979739026720652860250\winmgr.exe 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe File opened for modification C:\Windows\M-50502979739026720652860250 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2684 wrote to memory of 4140 2684 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 89 PID 2684 wrote to memory of 4140 2684 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 89 PID 2684 wrote to memory of 4140 2684 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 89 PID 2684 wrote to memory of 4140 2684 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 89 PID 2684 wrote to memory of 4140 2684 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 89 PID 2684 wrote to memory of 4140 2684 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 89 PID 2684 wrote to memory of 4140 2684 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 89 PID 2684 wrote to memory of 4140 2684 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 89 PID 2684 wrote to memory of 4140 2684 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 89 PID 4140 wrote to memory of 3448 4140 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 90 PID 4140 wrote to memory of 3448 4140 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 90 PID 4140 wrote to memory of 3448 4140 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 90 PID 4140 wrote to memory of 4908 4140 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 92 PID 4140 wrote to memory of 4908 4140 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 92 PID 4140 wrote to memory of 4908 4140 2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe 92 PID 4908 wrote to memory of 1112 4908 winmgr.exe 95 PID 4908 wrote to memory of 1112 4908 winmgr.exe 95 PID 4908 wrote to memory of 1112 4908 winmgr.exe 95 PID 4908 wrote to memory of 1112 4908 winmgr.exe 95 PID 4908 wrote to memory of 1112 4908 winmgr.exe 95 PID 4908 wrote to memory of 1112 4908 winmgr.exe 95 PID 4908 wrote to memory of 1112 4908 winmgr.exe 95 PID 4908 wrote to memory of 1112 4908 winmgr.exe 95 PID 4908 wrote to memory of 1112 4908 winmgr.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_5bd5a35cac3ccfcf2bc92bdcbdeaea2b_magniber.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\alkvyfrjjv.bat" "3⤵PID:3448
-
-
C:\Windows\M-50502979739026720652860250\winmgr.exeC:\Windows\M-50502979739026720652860250\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\M-50502979739026720652860250\winmgr.exeC:\Windows\M-50502979739026720652860250\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1112
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD5994eb76eeaecbf6d3e23109fcd3e0cfb
SHA1224f7e4f71cc6ebd2d3c0168ed5eb1af74a00952
SHA256331f812ced2aa337a6aa82d06cf890212a852a0b66b6329236f02c10c3bb9a3e
SHA5120bf4137361277ee64fd8a62c2e6a3dff183a9ef7c0b2d4692a5213a5e4d2c5df47c71a3478ec4288a6aa15883d17458387cbe96420e311b6e70ff57588c170d0
-
Filesize
158KB
MD55bd5a35cac3ccfcf2bc92bdcbdeaea2b
SHA192c122fcfb0974dd7db945a158230484ab0d5ea3
SHA2562f77d79ed81700662374f3f87386cb2c9487485a787edfb751766e3d897888ae
SHA512eb62387fe0e53795c1f502ee8929b9624201c60a13ef7e6b01f2b9c3af7c94ce0aab60258370e7d716205303f49df670d8d01c6ea1d2166075f00e2729cf490e