Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 04:06

General

  • Target

    2024-05-02_74842638cba1a4795bd5b38f812e6cc3_magniber.exe

  • Size

    8.8MB

  • MD5

    74842638cba1a4795bd5b38f812e6cc3

  • SHA1

    abda85f46e572e8e65d7ef1eea9de573f20fe9e6

  • SHA256

    4270be483f1543e1608fd30f3fb86a36ce349d1b5b3b87d26d5819068c6fd788

  • SHA512

    9adde92da0d3b873450f8deb97619541f4b6d2a5e99227aa1fb32d574290596ba6125041b2e08f9dc1d763033b5dbd66bd22bee79e70fc9ffe84e57336fce1d5

  • SSDEEP

    98304:CmCMLyAw3LNIsVqygGP0w1sBJ1QttoFCqkKq7NO55f0pmsOWrqufezvWq/vUv2T8:uJBILX6svTCZWfFWrqufezvWqHUP

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 15 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-02_74842638cba1a4795bd5b38f812e6cc3_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-02_74842638cba1a4795bd5b38f812e6cc3_magniber.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2888
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 86FC520E273CDBC034549FC9221BEB85
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Users\Admin\AppData\Local\Temp\34096DB2-7901-4210-9293-401CC46AC34D\lite_installer.exe
        "C:\Users\Admin\AppData\Local\Temp\34096DB2-7901-4210-9293-401CC46AC34D\lite_installer.exe" --use-user-default-locale --silent --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2300
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 0F15B786CEA44D24AD09DDEE8E1851D0 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Admin\AppData\Local\Temp\579E9140-0054-41BC-9323-04622549F73B\seederexe.exe
        "C:\Users\Admin\AppData\Local\Temp\579E9140-0054-41BC-9323-04622549F73B\seederexe.exe" "--yqs=" "--yhp=" "--ilight=" "--locale=us" "--browser=" "--browser_default=" "--yabm=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\89997D0D-8688-4942-91FF-D226F5CF549D\sender.exe" "--is_elevated=yes" "--ui_level=5"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1492
        • C:\Users\Admin\AppData\Local\Temp\89997D0D-8688-4942-91FF-D226F5CF549D\sender.exe
          C:\Users\Admin\AppData\Local\Temp\89997D0D-8688-4942-91FF-D226F5CF549D\sender.exe --send "/status.xml?clid=2256427&uuid=%7B5A1C64E8-690F-42C5-8C48-F83EBAFC9920%7D&vnt=Windows 7x64&file-no=6%0A15%0A25%0A37%0A38%0A45%0A57%0A59%0A106%0A108%0A111%0A129%0A"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f769e73.rbs

    Filesize

    591B

    MD5

    88b5db147a0b422af39dfd811b6b2724

    SHA1

    1cfae016bedfe287938575bb5100f406368338e0

    SHA256

    88defc325e1f24c96b29396f9403f177e3e10e1ef2705b345da5c15dfc865cdc

    SHA512

    a93ebfba72bac09615abb05ae98d32b6a1f8f38b0f5668085dd6c9df1866ebc3c76234847f5a7822c41299fba2fa5a4a564bbf855daa3ec015cfe49176ee9d58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501

    Filesize

    1KB

    MD5

    346c8df0779bf3411aa6ca4958a95a13

    SHA1

    31787554e36295383193b57121e44a1cd031aade

    SHA256

    59be4b4e5ccb3e2d499f83b441efa50b3f196d3d46f2fb1bee528f306aba9845

    SHA512

    fdf885af858582784b5b954e43c0ec6bb55eff1f78f58f2aad74e469a4c2ef22d320fe09e62df9cdba78212264d4b5eee2700c9db894c95f1d9fa5e9cd7f1ee1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B0B1E3C3B1330A269DBEE4BA6313E7B4

    Filesize

    1KB

    MD5

    2ffbdb98df2a2b022a48adeb94a3af50

    SHA1

    6c86923b5c5832bb102f041cb7d38db397074f12

    SHA256

    dd12c5733bc4b682e1da6353c8c27650f53d11a8ada8fd8a2d06f23cecae5ebd

    SHA512

    a5f29661ac78ea205dd945fcc53e015152277426af4bcce688231ca1a564dc49144b2953409651737733fec72e9042468c780917543c007d7de74ed44058dbfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501

    Filesize

    508B

    MD5

    0d31ceef355d128e838da31086e4f352

    SHA1

    1f5a41d0c02a579426a234fc0e81e6fbaee408d3

    SHA256

    2bcd4c0ed9580e579a2cd8d2499d16d8011e3cf248f300e0d4d95ba0d5ad148c

    SHA512

    8a71bb55061ad7973eee8c3040c879548f53ebb8128b3618bc69a6c615592f4056329345cc8a0e83e90264f226c7fd60c071f1fd9724e218e96469933851128f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b0cb88de539381b91661b7731b68f534

    SHA1

    20ce90f9531963de1d71b8fdf3d4f92b6c6bd701

    SHA256

    8e981b21de406782b9fc7cd34de33ef9524150c8b899d9559b4ff09055fa1ce2

    SHA512

    c172303df1d42e793df0c7c6775e7140adabe4e0e8d1c7f2a6f95e5abd8f04fccdac35efd09950d56d686b48813e106e129d1d034e2bb8a603ed920a16cf6553

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B0B1E3C3B1330A269DBEE4BA6313E7B4

    Filesize

    208B

    MD5

    4c96664820079200c850a5d1c6c62d07

    SHA1

    6bd6d486916262cc09e0daf13af0b6afdb404e7a

    SHA256

    68ad2a46bb2771fd1c51d4784f4179992c8efdcf0f828aeeb11676415ee59d16

    SHA512

    faa11b691ff1ba4715334dab76001a1656770ad91e40d9dde5ef54e16cc6c10ea953619f93a4049a0b124d57e26ae865d57cdce87b934324612ce204080fe03c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0

    Filesize

    440B

    MD5

    cf727106f88d0a01487ea14563071b04

    SHA1

    c9646494530984b51b7f35f55ba90ba8eb555de5

    SHA256

    587e746c3c925e0bf748276df60c76228d2f7a45bda11fce3659dcbc8c04baa2

    SHA512

    9585b2caabb3a8d4da9bdbfa22cea1a48830f314cb7ae46ed64e60302f06aa4fb0ec87a328480e0e6d37a7a13e15a653f79289313d00b008db2d5ad02f282c3f

  • C:\Users\Admin\AppData\Local\Temp\CabA573.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\OMNIJA~1.ZIP

    Filesize

    41.3MB

    MD5

    1d6cfd7db58008d1b44328c5a3a4220c

    SHA1

    8e8304bfd7a73b9ae8415b6cbd273e612868a2b2

    SHA256

    915e46dcc29d6fee123c4b8e88d846ac95ffd4a6f4eb956dc882d305ee1b8256

    SHA512

    4c17160aa83abeff897462f981226902dd6694817ad95f246511fc63c637bdffa0989a3db00c4309fa673a13b4993c509df538ddad482d1be8b4058749ee93f2

  • C:\Users\Admin\AppData\Local\Temp\YandexSearch00000.log

    Filesize

    34KB

    MD5

    018aa0689cc0c5b47daccf41738a1691

    SHA1

    6c3458da8a76528259b079d305af0953d7fe9097

    SHA256

    b545d40134df6073077532ca9e2d2fad32cdd6434fbf30a0a7be80b594d4c0db

    SHA512

    89302c53bd81ba440417bfbe1dd171bc8e045f79a2405e95747f80bd82a4c57423634bd5c392e0566a6bb9bc18dc6fc98120ce7a605f0344076a1c7a5a6a169a

  • C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml

    Filesize

    547B

    MD5

    f9a0e534b98d998c0852c741ee7141b8

    SHA1

    5f99c91af17779a6cc7cf1c6acdffcbb253e6acf

    SHA256

    b6e403e31e501a08efe465964c8b1b9fe5d1ff4077294bfda06f797ae0023222

    SHA512

    1783be18356571b287cbdad758b1957f917266fe83e2206d95e600b8aaac2430bc66b4f0a5a5e1856c3e22f760e795fe467a03c1bf0e00094a43bdf4f8779991

  • C:\Users\Admin\AppData\Local\Temp\vendor00000.xml

    Filesize

    584B

    MD5

    d7d1fe2aa415e84bd229958bea13cb1a

    SHA1

    6e052f6a3c7ded5256684a59f324d0d436380dcb

    SHA256

    fb1c6061fe1ff0a424e5debe2f86c4a33fe9908c4a7c00b3e86b9a9c3901a802

    SHA512

    4f7fdc1ef2d5b17f89e99f5cc76b66327880643bb140136090233c77bb32a837154f09eedbbd0f3bd21bf29b69b34d5b733816e2c094bf917ac756585443a1d1

  • C:\Users\Admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msi

    Filesize

    8.5MB

    MD5

    1858a58e1fc9349615ec7a68927bf0cf

    SHA1

    45385ad3f76ad8ed577c1953066b6c1f51384423

    SHA256

    82426b329430475ea9300d18137c277277c826aba78ee5f3c0b13c8adebe80ab

    SHA512

    8541a69195d5728e722fdb3e95f5aec83121bdef136bd45909951fd461aad2f0ece06a9b8d1bfbc49f2dc4912e73336d527c8bfa1e2444cfe4994c7a57ffb6d8

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gdoevwuq.Admin\places.sqlite-2024060233.994400994.backup

    Filesize

    68KB

    MD5

    d57cd95de07d3b15eb5cf8baa80471af

    SHA1

    322c0e13f2022ab255a8d2a50c5835779b6ccc3e

    SHA256

    651efdc8961efbf6476e4cc4b3965a4da72690ebedda009fd800c6d936a67696

    SHA512

    2e98256a9e76ae384f88b83075a321f60cb13ee6f7e8cb93f1919103b82ba79a67b5eec8a7d3043fe26b377fae58545e82323813897c0e67adfacaa885d6f68e

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gdoevwuq.default-release\extensions\staged\[email protected]

    Filesize

    1KB

    MD5

    5a40649cf7f6923e1e00e67a8e5fc6c8

    SHA1

    fc849b64b31f2b3d955f0cb205db6921eacc1b53

    SHA256

    6d432ba7096090837f9533a33a686c846ad67aed8ecc43af7ce8af42649cd51a

    SHA512

    0fc42a2cc61528b14478f4b9ae098ea90e6b05ddbe10f3a6cdd6326d0d8e6185b49d2b8143b76a9f329bdc277cf02b54d98f374edd65df68a1ffc41e1c817786

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gdoevwuq.default-release\extensions\staged\[email protected]

    Filesize

    688KB

    MD5

    ab6d42f949df8d7e6a48c07e9b0d86e0

    SHA1

    1830399574b1973e2272e5dcc368c4c10dbbe06b

    SHA256

    205ebf52c47b42fa0ad1a734a1d882d96b567e15a32b19bdb907562db8ea09e2

    SHA512

    6c4f9bb726384c87b6523e08339f7821ad4ec8717b26db902ca51df74eb89b46e4ded1504a131683b07b2bba3e6e911a549a8a83b2aad3971047c0fe315a1ad5

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gdoevwuq.default-release\extensions\staged\[email protected]

    Filesize

    5KB

    MD5

    856242624386f56874a3f3e71d7993f4

    SHA1

    96d3199c5eebb0d48c944050fbc753535ee09801

    SHA256

    d86ed80d2a9e4e1af843a991a6553a2fefd5433b2144be0cfb63a2f18deb86be

    SHA512

    76d440fe2ed535677a1d249b289463bfedfc5d2afc0e269e4593bb113393f165856c07117735cf3e5a230b5d04a61c7126df24a466594d8c27b47b2047834a09

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\gdoevwuq.default-release\extensions\staged\[email protected]

    Filesize

    1.7MB

    MD5

    e68cea8c6d4b16641f30dd930a952ebb

    SHA1

    7e8c4b51e6e56f35a2983ab6cb121341aeda565c

    SHA256

    a7f3f788323a12158d66f341c4711d71fc2244a2b07a68fb8df4baec0ff76f35

    SHA512

    96351e36a4c5020ed464b96b72bb3063db819981440bde7c6c3a50f7fe470e1d70f0350ec7c4bcd4808fcabe2ddfbdebfc7039ae2248c1455e2245f53ce44ec0

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Bookmarks-2024060234.446800446.backup

    Filesize

    1KB

    MD5

    3adec702d4472e3252ca8b58af62247c

    SHA1

    35d1d2f90b80dca80ad398f411c93fe8aef07435

    SHA256

    2b167248e8136c4d45c2c46e2bff6fb5e5137dd4dfdccde998599be2df2e9335

    SHA512

    7562e093d16ee6305c1bb143a3f5d60dafe8b5de74952709abc68a0c353b65416bf78b1fa1a6720331615898848c1464a7758c5dfe78f8098f77fbfa924784c0

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Preferences-2024060234.446800446.backup

    Filesize

    313B

    MD5

    af006f1bcc57b11c3478be8babc036a8

    SHA1

    c3bb4fa8c905565ca6a1f218e39fe7494910891e

    SHA256

    ed6a32e11cc99728771989b01f5ae813de80c46a59d3dc68c23a4671a343cb8c

    SHA512

    3d20689b0f39b414349c505be607e6bfc1f33ac401cf62a32f36f7114e4a486552f3e74661e90db29402bb85866944e9f8f31baba9605aa0c6def621511a26af

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    ef616fd19fb4ecab92cdf76cd0f98029

    SHA1

    68ffe2171db258bb327ad799a81f720db448006d

    SHA256

    72ef98b8f776e3fcc3e2ba2ed064a299b6721f0a434689d7c0ac34817bbe0069

    SHA512

    76874934cb49d5761b12431f5429fd71a58160931c6b58588e6e25a636b7984a65a610ca888a42c6e7b879f3f6eb54ba688f1483d09f12878ba00a084ba327a0

  • C:\Windows\Installer\MSIA7D5.tmp

    Filesize

    172KB

    MD5

    694a088ff8fa0e3155881bb6500868bc

    SHA1

    096626661b9bcb3b3197b92e7e3c4e77ad4b2df4

    SHA256

    6f3a5bbd29f669712d6c2c7e5174dea6807cb86fda293acbe360bde81d29a633

    SHA512

    bd3a9cdf9ea591d462be8e00e9bc44c391897c40d598ada19f0377f3a6aea97aba03627d97d6362edbb81763fe3c7570d07bdfd5a004dd9e7af4531bc490bdeb

  • C:\Windows\Installer\MSIAA46.tmp

    Filesize

    189KB

    MD5

    c3a831564e7b54fb7b502b728e232542

    SHA1

    82a4f969b1f19dc6489e13d357ccad9fef4837ab

    SHA256

    43097d66f86e3a1103d4cc7c410e46daba8d1a7a991ab6c222d41bd2620c19ca

    SHA512

    4855ca4429974a0b111d42b86cb8f89188310aaaf9174b4cf462a968163c8b92e38d4a519c78133301b341be5cd02e34b55b55575e84f0d01c2cd11ae74cce05

  • C:\Windows\Installer\MSIB41F.tmp

    Filesize

    202KB

    MD5

    ba84dd4e0c1408828ccc1de09f585eda

    SHA1

    e8e10065d479f8f591b9885ea8487bc673301298

    SHA256

    3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

    SHA512

    7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

  • \Users\Admin\AppData\Local\Temp\34096DB2-7901-4210-9293-401CC46AC34D\lite_installer.exe

    Filesize

    390KB

    MD5

    28b10eff9b78787aa18e424fd9319064

    SHA1

    0bd2bc3665e8988567607460ea6bfc51d45d4d5c

    SHA256

    dbbbf54115fb97f777180f67ee341cf16803ed6e85bf9af60ea13d9b99be362d

    SHA512

    a908a231c9db21767066ab13ec4a8ac451bc978f5d8bccf5032e5ecbcaa996c7e2afff0121036cc184a3c19a4caf542bb15dbe6ad6dae16c422f6ac6bc5a791a

  • \Users\Admin\AppData\Local\Temp\579E9140-0054-41BC-9323-04622549F73B\seederexe.exe

    Filesize

    6.8MB

    MD5

    6df2e368846222aef04e596d9ea43aac

    SHA1

    57b59e1002d9d971fc504df0493d5ac54380027b

    SHA256

    f4adf79355ff21c11faf8283d06e28013478834a64d9473d27194f4dbcfed359

    SHA512

    a40636178285fa12b1b6f99802fdfd3b569c674b1864f5c6893ccb6a48c90232539704da8ea478457ead39c1f94c319467b41142c8aa26473a280c4fb329f662

  • \Users\Admin\AppData\Local\Temp\89997D0D-8688-4942-91FF-D226F5CF549D\sender.exe

    Filesize

    249KB

    MD5

    4ce9460ed83b599b1176c4161e0e5816

    SHA1

    ca1bd4f28ec3e6f4b0253764e6339e480d3549bd

    SHA256

    118d277f46df036ffb1ca69d9da7890c65c3807a6e88248f3ba703b0f51cd308

    SHA512

    1064da56e85d3b0c34c47e9fa0821b2ceb79e338e602e705b7f801c0a1bfb83246c340fa1351fc222216a12968bcc52540e105f186a3ef6f3e7c32348936daf3