Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 20:47
Behavioral task
behavioral1
Sample
2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe
Resource
win10v2004-20240419-en
4 signatures
150 seconds
General
-
Target
2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe
-
Size
20.9MB
-
MD5
ffc509e3271055eb48998822eb4c80cc
-
SHA1
c77ef67b7a67ad2940476a165fd10ba16a736d75
-
SHA256
baedf707f3f4c1d8272c8484c969c9e3e4d96e81af9331ff7e2048647ba07bc1
-
SHA512
322cb593a408d1092fcdbb8546fb7549258db3428554b1c5c1e9784d2f78100b752d6a32feb382ef090d561f700058bb42753ce8ce18debe6b2b82a520dc4cca
-
SSDEEP
393216:bDjB+WUWPWYU00TE0Cv/W5DjB+WUWPWYUV5IMlP:fjBrUWPWYU00TJCvCjBrUWPWYUV5IMN
Score
9/10
Malware Config
Signatures
-
Detects executables packed with Enigma 2 IoCs
resource yara_rule behavioral1/memory/2228-0-0x0000000000400000-0x00000000008FF000-memory.dmp INDICATOR_EXE_Packed_Enigma behavioral1/memory/2228-32-0x0000000000400000-0x00000000008FF000-memory.dmp INDICATOR_EXE_Packed_Enigma -
Detects packed executables observed in Molerats 2 IoCs
resource yara_rule behavioral1/memory/2228-0-0x0000000000400000-0x00000000008FF000-memory.dmp INDICATOR_EXE_Packed_Loader behavioral1/memory/2228-32-0x0000000000400000-0x00000000008FF000-memory.dmp INDICATOR_EXE_Packed_Loader -
Program crash 1 IoCs
pid pid_target Process procid_target 2484 2228 WerFault.exe 27 -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2228 2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe 2228 2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe 2228 2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe 2228 2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2484 2228 2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe 29 PID 2228 wrote to memory of 2484 2228 2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe 29 PID 2228 wrote to memory of 2484 2228 2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe 29 PID 2228 wrote to memory of 2484 2228 2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-04_ffc509e3271055eb48998822eb4c80cc_bkransomware_magniber.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 15282⤵
- Program crash
PID:2484
-