Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe
-
Size
164KB
-
MD5
efd5eabc8757cdd3e09fb06fde1a6083
-
SHA1
4219d1517d953b4d102b3d38c091be6aa73f9e05
-
SHA256
bf06e12df3325158df770827a5573db9b2984551cd6a8cd95d3201660ddaebca
-
SHA512
c3123a2660178d4296d61bec3245211bbf7e33529b32b89d72cc39d6f8372d03da0b47fb60a88fde8a75a8e5fee391f8a35b7c4acffb604c7e3ccbd57db47376
-
SSDEEP
3072:3r1cWI8i05JurTwXU/ulPgc9qz+9+++++q+l++7:b1RJxur8XMQPgyh+++++q+l++7
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2744 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
winmgr.exewinmgr.exepid process 2700 winmgr.exe 2564 winmgr.exe -
Loads dropped DLL 3 IoCs
Processes:
2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exewinmgr.exepid process 2772 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2772 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2700 winmgr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50502979739026720652860250\\winmgr.exe" 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50502979739026720652860250\\winmgr.exe" 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe -
Drops file in System32 directory 4 IoCs
Processes:
winmgr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exewinmgr.exedescription pid process target process PID 1996 set thread context of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 2700 set thread context of 2564 2700 winmgr.exe winmgr.exe -
Drops file in Windows directory 3 IoCs
Processes:
2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exedescription ioc process File created C:\Windows\M-50502979739026720652860250\winmgr.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe File opened for modification C:\Windows\M-50502979739026720652860250\winmgr.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe File opened for modification C:\Windows\M-50502979739026720652860250 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exewinmgr.exedescription pid process target process PID 1996 wrote to memory of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 1996 wrote to memory of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 1996 wrote to memory of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 1996 wrote to memory of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 1996 wrote to memory of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 1996 wrote to memory of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 1996 wrote to memory of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 1996 wrote to memory of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 1996 wrote to memory of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 1996 wrote to memory of 2772 1996 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe PID 2772 wrote to memory of 2744 2772 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe cmd.exe PID 2772 wrote to memory of 2744 2772 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe cmd.exe PID 2772 wrote to memory of 2744 2772 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe cmd.exe PID 2772 wrote to memory of 2744 2772 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe cmd.exe PID 2772 wrote to memory of 2700 2772 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe winmgr.exe PID 2772 wrote to memory of 2700 2772 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe winmgr.exe PID 2772 wrote to memory of 2700 2772 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe winmgr.exe PID 2772 wrote to memory of 2700 2772 2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe winmgr.exe PID 2700 wrote to memory of 2564 2700 winmgr.exe winmgr.exe PID 2700 wrote to memory of 2564 2700 winmgr.exe winmgr.exe PID 2700 wrote to memory of 2564 2700 winmgr.exe winmgr.exe PID 2700 wrote to memory of 2564 2700 winmgr.exe winmgr.exe PID 2700 wrote to memory of 2564 2700 winmgr.exe winmgr.exe PID 2700 wrote to memory of 2564 2700 winmgr.exe winmgr.exe PID 2700 wrote to memory of 2564 2700 winmgr.exe winmgr.exe PID 2700 wrote to memory of 2564 2700 winmgr.exe winmgr.exe PID 2700 wrote to memory of 2564 2700 winmgr.exe winmgr.exe PID 2700 wrote to memory of 2564 2700 winmgr.exe winmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_efd5eabc8757cdd3e09fb06fde1a6083_magniber.exe"2⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\lruhtzjjyu.bat" "3⤵
- Deletes itself
-
C:\Windows\M-50502979739026720652860250\winmgr.exeC:\Windows\M-50502979739026720652860250\winmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\M-50502979739026720652860250\winmgr.exeC:\Windows\M-50502979739026720652860250\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\lruhtzjjyu.batFilesize
278B
MD5d0dbf7ef5d4d7676a419f8e1d79a6a83
SHA19cacdb2d2d2f921e255f7aba0275a05325e17879
SHA25603df9fe06fe7c61278d51a98fcb376ebc6548333f6ac627fd66bf63303889980
SHA512541cd2f557fe126f0ccff9208431f15cfc3ec9f8f28f5d7ab2b52e2b962d5c5e075c004e23b388b62e3290de1dcf4b7bdb6b8146f510a059fec7cd15d97a4669
-
\Windows\M-50502979739026720652860250\winmgr.exeFilesize
164KB
MD5efd5eabc8757cdd3e09fb06fde1a6083
SHA14219d1517d953b4d102b3d38c091be6aa73f9e05
SHA256bf06e12df3325158df770827a5573db9b2984551cd6a8cd95d3201660ddaebca
SHA512c3123a2660178d4296d61bec3245211bbf7e33529b32b89d72cc39d6f8372d03da0b47fb60a88fde8a75a8e5fee391f8a35b7c4acffb604c7e3ccbd57db47376
-
memory/1996-7-0x00000000008B5000-0x00000000008C0000-memory.dmpFilesize
44KB
-
memory/1996-6-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1996-0-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2564-44-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2564-76-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2564-59-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2564-57-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2564-54-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2564-51-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2564-49-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2700-30-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2700-35-0x00000000002B0000-0x00000000003B0000-memory.dmpFilesize
1024KB
-
memory/2700-40-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2772-22-0x0000000002A50000-0x0000000002A7C000-memory.dmpFilesize
176KB
-
memory/2772-9-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2772-8-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2772-4-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2772-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB