Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe
-
Size
162KB
-
MD5
2e065ee344248d01633b3b87fb1da58b
-
SHA1
0097be3ce6d29c8bc54343e27a45831d34886bc5
-
SHA256
57a0d8b7f4613b21eec6d922afa98fd1f1e1f627d41557996ccfada8f851edb2
-
SHA512
36abae7950a15647a9a7caafea32704ab75b86e9a003e51ee01244a25349b0bcc2769b5873ed3065533c632a5e2edcfb385e16a9f75fb9f00449b464821f69ab
-
SSDEEP
3072:3r1cWI8i05JurTwXU/ulPgc9qz+9+++++q+z7:b1RJxur8XMQPgyh+++++q+z7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe -
Executes dropped EXE 2 IoCs
pid Process 4552 winmgr.exe 2464 winmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50502979739026720652860250\\winmgr.exe" 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50502979739026720652860250\\winmgr.exe" 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4384 set thread context of 1064 4384 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 88 PID 4552 set thread context of 2464 4552 winmgr.exe 92 -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.ZipFile.dll winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.ZipFile.dll winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe winmgr.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-50502979739026720652860250\winmgr.exe 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe File opened for modification C:\Windows\M-50502979739026720652860250\winmgr.exe 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe File opened for modification C:\Windows\M-50502979739026720652860250 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4384 wrote to memory of 1064 4384 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 88 PID 4384 wrote to memory of 1064 4384 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 88 PID 4384 wrote to memory of 1064 4384 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 88 PID 4384 wrote to memory of 1064 4384 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 88 PID 4384 wrote to memory of 1064 4384 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 88 PID 4384 wrote to memory of 1064 4384 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 88 PID 4384 wrote to memory of 1064 4384 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 88 PID 4384 wrote to memory of 1064 4384 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 88 PID 4384 wrote to memory of 1064 4384 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 88 PID 1064 wrote to memory of 1140 1064 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 89 PID 1064 wrote to memory of 1140 1064 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 89 PID 1064 wrote to memory of 1140 1064 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 89 PID 1064 wrote to memory of 4552 1064 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 90 PID 1064 wrote to memory of 4552 1064 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 90 PID 1064 wrote to memory of 4552 1064 2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe 90 PID 4552 wrote to memory of 2464 4552 winmgr.exe 92 PID 4552 wrote to memory of 2464 4552 winmgr.exe 92 PID 4552 wrote to memory of 2464 4552 winmgr.exe 92 PID 4552 wrote to memory of 2464 4552 winmgr.exe 92 PID 4552 wrote to memory of 2464 4552 winmgr.exe 92 PID 4552 wrote to memory of 2464 4552 winmgr.exe 92 PID 4552 wrote to memory of 2464 4552 winmgr.exe 92 PID 4552 wrote to memory of 2464 4552 winmgr.exe 92 PID 4552 wrote to memory of 2464 4552 winmgr.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-27_2e065ee344248d01633b3b87fb1da58b_magniber.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mjarogbqbt.bat" "3⤵PID:1140
-
-
C:\Windows\M-50502979739026720652860250\winmgr.exeC:\Windows\M-50502979739026720652860250\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\M-50502979739026720652860250\winmgr.exeC:\Windows\M-50502979739026720652860250\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2464
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD53720b20ede0f0beb8de3e371cdc9e17e
SHA1b9e3c5152453dd54e8eb8f9bb944a3eea4a4379d
SHA256b2c106d794a5bf59e16d948ddf2004244d876d7fbaebc5433eb2924ba2ea3430
SHA5128a9b7f2e06eef4276861be094eaf8a035fa54e8178266d20583c3502127a8133e6876c0a5454826228a6a3d3d735de49b37761ec03c93aeb0546db788f1b3c29
-
Filesize
163KB
MD5490135da4d524c9e50d42ab7a7924bee
SHA12fe9725f9525b1560f40c601867ee958e70fd49a
SHA256a2a0d2833c211e150742ddca6eb7ab387ab8c26a88ddfd352b2971108dae00e3
SHA512d8bea0f003c0957c0772872744088a70eff398eed466a7be653479dc7c5b3bff27a94375913e67fe87a3f8438528d5944e7d61a9213a79fad180606a81fa1e27
-
Filesize
162KB
MD52e065ee344248d01633b3b87fb1da58b
SHA10097be3ce6d29c8bc54343e27a45831d34886bc5
SHA25657a0d8b7f4613b21eec6d922afa98fd1f1e1f627d41557996ccfada8f851edb2
SHA51236abae7950a15647a9a7caafea32704ab75b86e9a003e51ee01244a25349b0bcc2769b5873ed3065533c632a5e2edcfb385e16a9f75fb9f00449b464821f69ab