Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 05:00

General

  • Target

    2024-04-27_90a9fe47b166a79203970f60a46f4ea7_magniber.exe

  • Size

    8.6MB

  • MD5

    90a9fe47b166a79203970f60a46f4ea7

  • SHA1

    05e22d5ecdd705e4942538991079d3656821471d

  • SHA256

    03d2321e8547c4f1d5eaf8470c12cdb8ba92697c90e9e0585e710126817a04a9

  • SHA512

    c0105776d9a1b7265a4795f06deca739e9e1cd403d3fd4ebab29dde044ae428508602a9abf68d32548982a1d189d4665e58d12461cc1af09c60ecf4bb2a6aa67

  • SSDEEP

    98304:176wMlkYxXKNgR7YjTMbk+ust6tXHJwWkHmPh7gCNq7N2/wK0pmsCWrqufezvktQ:Iwi3K+lYMIstaiOgC8KVWrqufezv3

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 15 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-27_90a9fe47b166a79203970f60a46f4ea7_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-27_90a9fe47b166a79203970f60a46f4ea7_magniber.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2772
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding DCA881C02ED0B29622215E24E956891B
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Users\Admin\AppData\Local\Temp\2076CFA1-F2C2-4AB4-A2B4-A2EF151435C9\lite_installer.exe
        "C:\Users\Admin\AppData\Local\Temp\2076CFA1-F2C2-4AB4-A2B4-A2EF151435C9\lite_installer.exe" --use-user-default-locale --silent --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1116
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 45F60E207D29A5468C8157DBD39FFCDB M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Users\Admin\AppData\Local\Temp\BD3C1A4B-10C7-4B92-BDA5-843DF2346BCE\seederexe.exe
        "C:\Users\Admin\AppData\Local\Temp\BD3C1A4B-10C7-4B92-BDA5-843DF2346BCE\seederexe.exe" "--yqs=" "--yhp=" "--ilight=" "--locale=us" "--browser=" "--browser_default=" "--yabm=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\C1AB4D3C-B70E-4E8C-AA11-F4CB5E6821E4\sender.exe" "--is_elevated=yes" "--ui_level=5"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Users\Admin\AppData\Local\Temp\C1AB4D3C-B70E-4E8C-AA11-F4CB5E6821E4\sender.exe
          C:\Users\Admin\AppData\Local\Temp\C1AB4D3C-B70E-4E8C-AA11-F4CB5E6821E4\sender.exe --send "/status.xml?clid=2254737&uuid=%7B54B3E054-0ED2-436B-993D-17DD86A5E7D1%7D&vnt=Windows 7x64&file-no=6%0A25%0A37%0A38%0A45%0A57%0A59%0A106%0A108%0A111%0A129%0A"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f7698a9.rbs

    Filesize

    591B

    MD5

    b00af20efd083e98696128921803dbdb

    SHA1

    a9757503780f5236adaa1e11a2a3796940787dc4

    SHA256

    7b60fc9c2612e0c99d3ff54bb565b1d6d004327a3ef858ffc51b2100f7dce389

    SHA512

    181b4441cd2623b1ea8c4a97bf65b8b50d7ac8f56bbc78bb38673d2ddcd8b4a5396f9b9ed08a173c57d4c6bd853bc5940262c2d49dedba6c2a9ae708be7a4f92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501

    Filesize

    1KB

    MD5

    6de4735813f22732251285b9cdee3851

    SHA1

    7d13fb7e72ad0e21cb3975c7de3092a1b7fefe41

    SHA256

    528ccfd733a226d8053be419a42a708daa29a12b84bbaf245b03742d8340ed66

    SHA512

    4f2623de42f128a58d93585bbf81fecb60f3ec3eef2d0c49cf4a08a0b46f7ce8f685068fc4cc6724d91e27da8941426f6491c66936ac35c00d188c246c0c623d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B0B1E3C3B1330A269DBEE4BA6313E7B4

    Filesize

    1KB

    MD5

    2ffbdb98df2a2b022a48adeb94a3af50

    SHA1

    6c86923b5c5832bb102f041cb7d38db397074f12

    SHA256

    dd12c5733bc4b682e1da6353c8c27650f53d11a8ada8fd8a2d06f23cecae5ebd

    SHA512

    a5f29661ac78ea205dd945fcc53e015152277426af4bcce688231ca1a564dc49144b2953409651737733fec72e9042468c780917543c007d7de74ed44058dbfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501

    Filesize

    508B

    MD5

    35d0250cb21821cfb7747d74586fec3c

    SHA1

    bbd5981a79e86dab6a8a9b189a9476b382112508

    SHA256

    c91d0f777f0bbc9327d8cd8a779481e55f89391ac67aaa939c6bdc0511b1497e

    SHA512

    7514d44d2c70d0383630187d993cd8763d6eb4befd79c3ad7902683c9f63e038eae63ebd580f93202aaca708bda7074f47a37b38508f701ffa9974e959de028f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f4e51eff1dc50eea52087d08b463a56

    SHA1

    4a89d6be55b85d78addea1ebb20fcb0ac008cd2b

    SHA256

    da61698c32c32619bbceb83767a4c3c7d2d5e6c1d939e61c377b272afede2afe

    SHA512

    8149387b6d17ddf2e94abdce8b51e2ba15f18f88c091ac1a3d8b43d5882db8ff2c0d5f1fc58ded7b18a458a12c3c4c62885e10d037c3a180337c98683b815dc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B0B1E3C3B1330A269DBEE4BA6313E7B4

    Filesize

    208B

    MD5

    011f947675af07f6c38931e4e57d6677

    SHA1

    554c7369f8a57969ff6fe038b24597c1e112930d

    SHA256

    59e110b00c6bfac02267b844539969c1da28c9af5a14d766b90f8f35c09c922b

    SHA512

    1ca213155e8dbba266010c1716bd35ea6e4676c9474b10f32a89d1ec2158f9b3870aa7b4bd4a1a56426e6343b83b9071b0fd1518a50f89116e9ab1922a678913

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0

    Filesize

    440B

    MD5

    3767816c9a21a0b1165d006fcdc52f42

    SHA1

    40816843e7e6d1b15731160098a820b9ec425148

    SHA256

    1d1a2b538e4a7392c0652bd80b4525c37a387d126347625b07d2fa244d6257fa

    SHA512

    6318b5aa4ef83df31dfb108f499307d891d6207b67f46a17eedceecd799d0ca99924357aa2f2a5d4f6aa1465585f823bbc7c1ca09d7ca3ba1d4e6bdc57978dcb

  • C:\Users\Admin\AppData\Local\Temp\C1AB4D3C-B70E-4E8C-AA11-F4CB5E6821E4\sender.exe

    Filesize

    249KB

    MD5

    6e7542de2100ae4b5070ddf52d6e94d4

    SHA1

    564d7867f7e10efc64af9e6d755ff6bca0b08891

    SHA256

    ed9b52c3ef991944a62c8c47555abe6b459eb51096da4312a09ac09e8b534b31

    SHA512

    67fbc9507c26ea37666e975c51a41c0ab1c68df2118034680ea8f8604e41383a4f3a7a57015e87bb3544ed1d462161bc53b7aecdd2436f88fcc0f1399f33c2c4

  • C:\Users\Admin\AppData\Local\Temp\Cab9B07.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\YandexSearch00000.log

    Filesize

    34KB

    MD5

    ec9252608ea0ed27be9f37bbb9ec776e

    SHA1

    0c0487e254346207d47dc19f328fe128dd0ff345

    SHA256

    0ef629a91606e563ee26373b4a5468127d71169a6e5b61c6cc7d7c6a6ee35958

    SHA512

    688d1f5aa6f43bc10f4a28c71702ac777bbaa901c8db1683661670b7ff1c327f2396619e7c94871acb10a350c9c0bc2fe43bbb671ec381b5f2aa6133fa1d945a

  • C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml

    Filesize

    549B

    MD5

    0b8a57142aa44fe4bf581abdcc5c8fcd

    SHA1

    bcf85db0d9411b523dd682cea7ecb8fc05eb353d

    SHA256

    54d977934d426c413d2d190a6b58db06c4bff4a3d412678fd5d7cc7f4a717ec1

    SHA512

    8b74a3bfe7ef32fe864c27f1c8f06fd4656903250be809344a4438200295835982f1dbb8614001259db9cb54230101905458dbd60d0c29b60e5c5808ab3b66c3

  • C:\Users\Admin\AppData\Local\Temp\vendor00000.xml

    Filesize

    586B

    MD5

    f3a4f7c3036060ae5445e6d077065413

    SHA1

    ea68438dc792ced3472f68d45c74765d00495d39

    SHA256

    4775f0650ef8c37d079eece58825038eeb1351b8b27334019b06d1b7ba36e5a0

    SHA512

    8745e3afba2d050614caa919c11e703c9d32fe81bc338c6682cfe85a83397ce19d052a55fab40c3a325fecb801fad5ae3fe3c9239f98859c07d047b49203b48e

  • C:\Users\Admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msi

    Filesize

    8.2MB

    MD5

    244e9928cb26658b03e52dd33b7495b1

    SHA1

    e4c43075f799537580a3b300582c45ddbf4889e5

    SHA256

    8979e6bef3339e0c7006025407018199f3527ba98a6eaa97e5d87d62140a800d

    SHA512

    ab9d91bffc7444f4fac03822b4147f6708ce12d795d5980b5ee5089cf9d54b23d3d232665788a7a2c5ae8617406f279969bba37a3da1a884deb57cdb80c93399

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nahd6ha2.default\places.sqlite

    Filesize

    68KB

    MD5

    d57cd95de07d3b15eb5cf8baa80471af

    SHA1

    322c0e13f2022ab255a8d2a50c5835779b6ccc3e

    SHA256

    651efdc8961efbf6476e4cc4b3965a4da72690ebedda009fd800c6d936a67696

    SHA512

    2e98256a9e76ae384f88b83075a321f60cb13ee6f7e8cb93f1919103b82ba79a67b5eec8a7d3043fe26b377fae58545e82323813897c0e67adfacaa885d6f68e

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Bookmarks-2024002743.158200158.backup

    Filesize

    1KB

    MD5

    3adec702d4472e3252ca8b58af62247c

    SHA1

    35d1d2f90b80dca80ad398f411c93fe8aef07435

    SHA256

    2b167248e8136c4d45c2c46e2bff6fb5e5137dd4dfdccde998599be2df2e9335

    SHA512

    7562e093d16ee6305c1bb143a3f5d60dafe8b5de74952709abc68a0c353b65416bf78b1fa1a6720331615898848c1464a7758c5dfe78f8098f77fbfa924784c0

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Preferences-2024002743.158200158.backup

    Filesize

    313B

    MD5

    af006f1bcc57b11c3478be8babc036a8

    SHA1

    c3bb4fa8c905565ca6a1f218e39fe7494910891e

    SHA256

    ed6a32e11cc99728771989b01f5ae813de80c46a59d3dc68c23a4671a343cb8c

    SHA512

    3d20689b0f39b414349c505be607e6bfc1f33ac401cf62a32f36f7114e4a486552f3e74661e90db29402bb85866944e9f8f31baba9605aa0c6def621511a26af

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    bbdfb092c7ad3e64d332ea376df051cc

    SHA1

    bda293f32e1ba889868da9d02dc12a1dcb80a913

    SHA256

    54c1c638ce4218950778a5c9ca389312994ae9bf6f861bbdcffc03e8f7ab33bc

    SHA512

    05a5829897bff5491ee70f737b9249db14f6dcb1248e9ba8d4882e15d5e9bd50819a15be39e824b4b0a36d2126e8deb25d15e5f93d8f87ef970413db88303126

  • C:\Windows\Installer\MSI9C41.tmp

    Filesize

    172KB

    MD5

    17d3de1fd7f7c6c3a6520d0fadea3e0e

    SHA1

    92587dfb70fcfc8db5aba782b414043ba24a5918

    SHA256

    fb28a17904096b3ee385d2fe1f033298519c0ebf69ced454b45fdad5247589c9

    SHA512

    1be8de8180e8a86735d8b3d97c808b85a6be545d9946b117b39c6e1c37124ac4ee6acf314d1982249b531fd24097d6a30a0b5228f0b30ccd66a5fdb4ed3e4f5a

  • C:\Windows\Installer\MSI9DE8.tmp

    Filesize

    189KB

    MD5

    84be3b020067fb25e77e72710291a70a

    SHA1

    792feeafa52d93e5ec6538794cd97df49666b7ea

    SHA256

    8591f02e50663689043d6dec34ade65cb24732914b73de5faa43e74ed5b6450c

    SHA512

    1eb0fe8f5501e623efcd033665132ee3859968aede5f496634ac107008eaa3964941d019a207c63e21c8b76f45bad718ca70c10ab81f8dccdf0fb89acfb9a0bc

  • C:\Windows\Installer\MSIA6D6.tmp

    Filesize

    168KB

    MD5

    a0962dd193b82c1946dc67e140ddf895

    SHA1

    7f36c38d80b7c32e750e22907ac7e1f0df76e966

    SHA256

    b9e73e5ab78d033e0328fc74a9e4ebbd1af614bc4a7c894beb8c59d24ee3ede9

    SHA512

    118b0bd2941d48479446ed16ab23861073d23f9cc815f5f1d380f9977f18c34a71f61496c78b77b9a70f8b0a6cd08fe1edc1adb376dad5762ad0dd2068c64751

  • \Users\Admin\AppData\Local\Temp\2076CFA1-F2C2-4AB4-A2B4-A2EF151435C9\lite_installer.exe

    Filesize

    390KB

    MD5

    d76e1d741effdfbed89984c77b180fa7

    SHA1

    966734fcf45a54485e821a7f3af537001d0caa6a

    SHA256

    0e3bde3de1a5decc4ce438bc945c532ee0d3674aeae2f2a259f685d58d53fd8f

    SHA512

    8dc5f11f716ac2066e542cf4f6faa2236a360386861e4c3e4a216ee9dba62bc099700e2241f75ba9db61fd56081fc1c8521f31cba4ff953241cc19560ae6a4e5

  • \Users\Admin\AppData\Local\Temp\BD3C1A4B-10C7-4B92-BDA5-843DF2346BCE\seederexe.exe

    Filesize

    6.7MB

    MD5

    f9df2f062bdb4c2be3a3129230103030

    SHA1

    9cc3b360f49962f4fd4dff057315fa5531210707

    SHA256

    4867db55dfebe3c66f907b0214c6a746c3ed774338c85999d756d2bcca00b76e

    SHA512

    1398c9c1b0b1be117fc082068d67aacbf0e9899c6dc424ab883f58d5deeb4cac75b42d1ba64c4a3a7f6553dd05dbb54e67b84215f3bb9b0a0e2fdaf76787be73