Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-04-2024 11:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe
Resource
win7-20240221-en
General
-
Target
2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe
-
Size
16.1MB
-
MD5
1a3d9ceb79965557c39b63f0d86b9397
-
SHA1
d597a3741f5799056778490608f121a8e389f01c
-
SHA256
ceaad01dfbfc5cae82a5c3fc83e867bd41648a534ad463e6d58b8322e7967ce6
-
SHA512
20c87bc9cc938c1a1458ba5be13f8340fc8dbd7c7f912db15d47a8ceb78369d0b9911f30f5f4b801673477d545051e02815fcf43453bf27d9c399ef67bd14462
-
SSDEEP
393216:sRjlV3inuC5K1M5ut2nijFiyD7XMOx0JrqNDUG2zYY14dYCCt37v9y:UlV3dC5K1M5FijwyDrP0NG2y
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Loads dropped DLL 5 IoCs
pid Process 2460 regsvr32.exe 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 2940 DllHost.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BC09008B-15CE-462E-BD15-AB51324729D4}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EA254B1E-3176-4816-9B2A-C25EFD3545D7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EA254B1E-3176-4816-9B2A-C25EFD3545D7}\TypeLib\ = "{462B192A-B4FB-4E40-A255-0905A37CBA61}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{987CD7D7-09EF-4EFF-9AFD-64AE892E0113}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2971308-C011-4AF5-86A0-4C374EA9ADBF}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BFD18878-92B5-40A5-B6A7-584E4E258808}\TypeLib\ = "{462B192A-B4FB-4E40-A255-0905A37CBA61}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{047784C5-9559-4D46-B5DC-63C7264602BE}\TypeLib\ = "{462B192A-B4FB-4E40-A255-0905A37CBA61}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE1DC8C1-1F7E-49E2-B9B6-61F3188BE346}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10335249-1AD1-493B-BC41-B934EC5F7806}\VersionIndependentProgID\ = "Statist_Prog_Id" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6DBB259-C5CD-414E-89E0-C111FA5A5069} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A249FCE8-6781-4667-A8C5-DCA879885BFC} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{99813506-6787-4F94-9841-D68603E24F97}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3EE15E47-5D96-4C6F-A5E6-6099E9C74E61}\TypeLib\ = "{462B192A-B4FB-4E40-A255-0905A37CBA61}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FC488F89-203C-4DA5-A8E5-F6364344681F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF0E6C56-94AA-4DE6-A5F4-721A0E2240DA}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF0E6C56-94AA-4DE6-A5F4-721A0E2240DA}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B648106-B0E6-4142-B97E-B0A1308A18BC}\ = "OptionItemInfo Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE1DC8C1-1F7E-49E2-B9B6-61F3188BE346}\AppID = "{EA99D9A6-92E7-43AD-9616-97BEA0A8CC1B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AAF1B65C-5621-42A4-A5A1-1ECEADB60979}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6D36CBB6-AA91-4986-82D7-228D123C3160}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0442FC3C-1B29-4727-ABAB-87037321DD29}\InprocServer32\ = "C:\\ProgramData\\Soda PDF Desktop 12\\Installation\\Statistics.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AAF1B65C-5621-42A4-A5A1-1ECEADB60979}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4EAE84A1-48D8-45E4-BF9C-446333F4111D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A6DBB259-C5CD-414E-89E0-C111FA5A5069}\TypeLib\ = "{462B192A-B4FB-4E40-A255-0905A37CBA61}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6B23A337-E4CA-4CB2-AB24-4EECDFD85266}\ = "CancelDataStruct Class" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AAF1B65C-5621-42A4-A5A1-1ECEADB60979}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{10335249-1AD1-493B-BC41-B934EC5F7806}\InprocServer32\ = "C:\\ProgramData\\Soda PDF Desktop 12\\Installation\\Statistics.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{02D92802-E58F-4587-8BB6-A7E3C1FCF576}\TypeLib\ = "{462B192A-B4FB-4E40-A255-0905A37CBA61}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{02D92802-E58F-4587-8BB6-A7E3C1FCF576} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A249FCE8-6781-4667-A8C5-DCA879885BFC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF0E6C56-94AA-4DE6-A5F4-721A0E2240DA}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE1DC8C1-1F7E-49E2-B9B6-61F3188BE346} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AAF1B65C-5621-42A4-A5A1-1ECEADB60979} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BC09008B-15CE-462E-BD15-AB51324729D4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{462B192A-B4FB-4E40-A255-0905A37CBA61}\1.0\HELPDIR\ = "C:\\ProgramData\\Soda PDF Desktop 12\\Installation" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0A49DF67-14D2-4726-86F4-21DF18ED307B}\ = "IStartDataStruct" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{02D92802-E58F-4587-8BB6-A7E3C1FCF576}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1A172F54-610F-493E-A119-84CDBCE19932}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{61D40A79-EFAE-40A0-88CB-59C15CC521CF}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26B6C985-00D8-40B6-BB76-618294F53100}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AAF1B65C-5621-42A4-A5A1-1ECEADB60979}\InprocServer32\ = "C:\\ProgramData\\Soda PDF Desktop 12\\Installation\\Statistics.dll" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BE1DC8C1-1F7E-49E2-B9B6-61F3188BE346}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4D763BB2-3FFA-43E8-8AE2-408CBAEDD237}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B75A7903-6951-400D-810F-FE6C8E271380}\TypeLib\ = "{462B192A-B4FB-4E40-A255-0905A37CBA61}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{168B9C24-37C6-49DD-8659-177DBCAB5838}\TypeLib\ = "{462B192A-B4FB-4E40-A255-0905A37CBA61}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A249FCE8-6781-4667-A8C5-DCA879885BFC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{047784C5-9559-4D46-B5DC-63C7264602BE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B167550B-09F7-4C59-B17F-25EBEB866B8B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1A172F54-610F-493E-A119-84CDBCE19932}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{61D40A79-EFAE-40A0-88CB-59C15CC521CF}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6D36CBB6-AA91-4986-82D7-228D123C3160}\AppID = "{EA99D9A6-92E7-43AD-9616-97BEA0A8CC1B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40C9186A-7AB1-43A3-B3FE-47FE5AE820D3}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{168B9C24-37C6-49DD-8659-177DBCAB5838}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{987CD7D7-09EF-4EFF-9AFD-64AE892E0113} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7820DB4E-4DA1-4D97-B140-73B6F7801256} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B75A7903-6951-400D-810F-FE6C8E271380}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6D36CBB6-AA91-4986-82D7-228D123C3160}\ = "InstallItemsList Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AAF1B65C-5621-42A4-A5A1-1ECEADB60979}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BC09008B-15CE-462E-BD15-AB51324729D4}\TypeLib\ = "{462B192A-B4FB-4E40-A255-0905A37CBA61}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B75A7903-6951-400D-810F-FE6C8E271380} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{047784C5-9559-4D46-B5DC-63C7264602BE}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99813506-6787-4F94-9841-D68603E24F97}\ = "IInstallItemToolbar" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7D8E1AD8-9F39-4893-8E7D-4711474B309E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AFF42A83-1142-4A9F-ABDE-517BBA666E02}\TypeLib regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2776 msiexec.exe Token: SeTakeOwnershipPrivilege 2776 msiexec.exe Token: SeSecurityPrivilege 2776 msiexec.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2460 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 28 PID 2928 wrote to memory of 2460 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 28 PID 2928 wrote to memory of 2460 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 28 PID 2928 wrote to memory of 2460 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 28 PID 2928 wrote to memory of 2460 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 28 PID 2928 wrote to memory of 2460 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 28 PID 2928 wrote to memory of 2460 2928 2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-24_1a3d9ceb79965557c39b63f0d86b9397_magniber_revil.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\ProgramData\Soda PDF Desktop 12\Installation\Statistics.dll"2⤵
- Loads dropped DLL
- Modifies registry class
PID:2460
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{EA99D9A6-92E7-43AD-9616-97BEA0A8CC1B}1⤵
- Loads dropped DLL
PID:2940
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5f9acde23d61ec10e842826c6ee4803a3
SHA1a7d11eb7aad25b8bc4166777cca01636d3df70f4
SHA256a1c5e9f2f75fbd958489142086d8a05d1f93bc8fb79826af2f1283281955c6e6
SHA512c368ff43a8c7714ac0768e9282e194a714d3d7c637e1c29fffcd8015c9802b3f590f9787b44105c205b25379cb9effd27219324a11bb427a0290ddb0e5c612cf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a