Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2024 03:29

General

  • Target

    2024-04-22_5b81605235921d9c8d90130692bdf21e_magniber_revil.exe

  • Size

    18.3MB

  • MD5

    5b81605235921d9c8d90130692bdf21e

  • SHA1

    f3fdefeb2a2d97f3181416b65b8d3a485389b72c

  • SHA256

    c7fb240cdf01d946f633dfd8614471c9421b7d6148a5b7138ccda33c52508647

  • SHA512

    75649bf132a08a2c616c794ffa7ad4b23dd10a4d144c446d3ece18ff6b2753d9f04d75c1a86e02631c31532dbb1d3b7a4e959f944e3d878f16d0358f9e2396bd

  • SSDEEP

    196608:3GDZ9hB+JsVSeYmvvsqirsYmDwwzuhK+IAsrZ+urqN+ElcA9ORd3MZhqaq:CZ9vjVXPsqPtz3jd+urqNjG3Cqa

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_5b81605235921d9c8d90130692bdf21e_magniber_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_5b81605235921d9c8d90130692bdf21e_magniber_revil.exe"
    1⤵
    • Checks computer location settings
    • Checks for any installed AV software in registry
    • Writes to the Master Boot Record (MBR)
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:940
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 3256
      2⤵
      • Program crash
      PID:224
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 940 -ip 940
    1⤵
      PID:4560
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4756

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\V01.log

        Filesize

        512KB

        MD5

        a1ba5ce44d838226acba27ff2799f905

        SHA1

        4951d2095fc037fd81a24e3296e82ec8a827a3aa

        SHA256

        29317ca2e90ce8590f830a5b9366d2a481bad161e7e2d921fc0c2108fbccd286

        SHA512

        744c5064b8dbad3b1633830c11d1376ce7ad309cc27fda1434b51f1892c0ce4ca673210eb42bb0f58e2193698047c72df1ab327e88b8adaf48bd35e94bb8c8d9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

        Filesize

        14.0MB

        MD5

        0d27edb021a5c1e7ac2b8d23d401f487

        SHA1

        91e4a62e695479d25339c35bfabdb9a01c848578

        SHA256

        e171e150da426e71b89fbe9f1a95c2bd6655f69313c31d7e9b91f9a533aedb12

        SHA512

        c1564a7d3238cefee2d9817b4d21f4ec88153b687c8e62d4f93a5706146de44d0e1854941779d2e8639e3f07f3082c12d50460a2aa26f3c7974f0505924c72bb

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm

        Filesize

        16KB

        MD5

        81c10d20824eaf277e99f6952d2b8362

        SHA1

        03c9899749a59d393ffb297e095859148f4d9fd7

        SHA256

        1863178190d0eb0e5aa5584e4e680023c016ea4931fcd1e4032936af1903714c

        SHA512

        812037dc93a264da7b72e7f934121e8bc4a6997a8e10086b4d22f893c5cd7b8dbb1bc87d2ac4c8bc7e61e6fd04d5f48e945e8314dd4533d2090ac65bc844ae86

      • memory/940-34-0x000000000AF40000-0x000000000AF48000-memory.dmp

        Filesize

        32KB

      • memory/940-37-0x0000000009A30000-0x0000000009A31000-memory.dmp

        Filesize

        4KB

      • memory/940-5-0x00000000041E0000-0x00000000041E1000-memory.dmp

        Filesize

        4KB

      • memory/940-6-0x00000000041F0000-0x00000000041F1000-memory.dmp

        Filesize

        4KB

      • memory/940-7-0x0000000004200000-0x0000000004201000-memory.dmp

        Filesize

        4KB

      • memory/940-8-0x0000000009E60000-0x0000000009E70000-memory.dmp

        Filesize

        64KB

      • memory/940-14-0x000000000A000000-0x000000000A010000-memory.dmp

        Filesize

        64KB

      • memory/940-0-0x0000000003630000-0x0000000003631000-memory.dmp

        Filesize

        4KB

      • memory/940-36-0x0000000009A40000-0x0000000009A48000-memory.dmp

        Filesize

        32KB

      • memory/940-4-0x00000000041D0000-0x00000000041D1000-memory.dmp

        Filesize

        4KB

      • memory/940-39-0x0000000009A40000-0x0000000009A48000-memory.dmp

        Filesize

        32KB

      • memory/940-42-0x0000000009A30000-0x0000000009A38000-memory.dmp

        Filesize

        32KB

      • memory/940-45-0x00000000099F0000-0x00000000099F1000-memory.dmp

        Filesize

        4KB

      • memory/940-3-0x00000000041C0000-0x00000000041C1000-memory.dmp

        Filesize

        4KB

      • memory/940-57-0x0000000009A70000-0x0000000009A78000-memory.dmp

        Filesize

        32KB

      • memory/940-59-0x000000000ADD0000-0x000000000ADD8000-memory.dmp

        Filesize

        32KB

      • memory/940-62-0x0000000009A30000-0x0000000009A31000-memory.dmp

        Filesize

        4KB

      • memory/940-66-0x00000000099F0000-0x00000000099F1000-memory.dmp

        Filesize

        4KB

      • memory/940-2-0x00000000041B0000-0x00000000041B1000-memory.dmp

        Filesize

        4KB

      • memory/940-1-0x00000000041A0000-0x00000000041A1000-memory.dmp

        Filesize

        4KB