Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2024, 03:50

General

  • Target

    2024-05-05_4e33ce1f6a2f81ab2962781449e6eecd_magniber.exe

  • Size

    8.6MB

  • MD5

    4e33ce1f6a2f81ab2962781449e6eecd

  • SHA1

    9651b9586718f4db20969b7abea938f3f08a1b4e

  • SHA256

    3c35642eb268fa9f47f99a150c0dbb43bec1e262c4078e768cf51e6b408a069b

  • SHA512

    90901b141c9a7ebb0fc1e755e9de3296ea414873c0b4a68c20883d70a7dd17dd2ac0c22a45f1f105220532ab26d525159c3427a84958243298182768a77883e2

  • SSDEEP

    98304:U7cMZuyxXKNgR7YjTMbk+ust6tXHJwWkHmPh7gCNq7N2/wK0pmsCWrqufezvk/sZ:ZgK+lYMIstaiOgC8KVWrqufezvl

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 15 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-05_4e33ce1f6a2f81ab2962781449e6eecd_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-05_4e33ce1f6a2f81ab2962781449e6eecd_magniber.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2324
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 89AA17D476E127B617811B85CE51D2C0
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Users\Admin\AppData\Local\Temp\5DA9123D-C8C1-4907-A63C-2829E227CCC1\lite_installer.exe
        "C:\Users\Admin\AppData\Local\Temp\5DA9123D-C8C1-4907-A63C-2829E227CCC1\lite_installer.exe" --use-user-default-locale --silent --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:308
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 24A06C56C49F96A34ED92231C97DD01C M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Users\Admin\AppData\Local\Temp\E17C1314-6D9B-45D2-A584-50C119B304EA\seederexe.exe
        "C:\Users\Admin\AppData\Local\Temp\E17C1314-6D9B-45D2-A584-50C119B304EA\seederexe.exe" "--yqs=" "--yhp=" "--ilight=" "--locale=us" "--browser=" "--browser_default=" "--yabm=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\CA3D4940-D25F-4361-8F90-AD04ED11F268\sender.exe" "--is_elevated=yes" "--ui_level=5"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Users\Admin\AppData\Local\Temp\CA3D4940-D25F-4361-8F90-AD04ED11F268\sender.exe
          C:\Users\Admin\AppData\Local\Temp\CA3D4940-D25F-4361-8F90-AD04ED11F268\sender.exe --send "/status.xml?clid=2257102&uuid=%7B8C8B97F5-F610-48BC-9707-002837E4096D%7D&vnt=Windows 7x64&file-no=6%0A25%0A37%0A38%0A45%0A57%0A59%0A106%0A108%0A111%0A129%0A"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f762510.rbs

    Filesize

    591B

    MD5

    b8ba9c0bba228f3ad96f61734cfba446

    SHA1

    12a29828d31833f59ff731748f346ac993998d65

    SHA256

    f00cc66083c0e1d6ef7c93bb85c6a8eb168bdd94de3d9ef4167236c96a4a4221

    SHA512

    19480f606598163191d9085a36a1f6d9d29385599c6e99a7aa870bc1264fb45be9f20cae3935c1b67544daa6ec5606b2bdedff4b274b0178511ddf04f52eeea6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501

    Filesize

    1KB

    MD5

    11328a348d752e784815f061ce51dab5

    SHA1

    9e8d50eb943ae29cfc518c34f9278e67337454f6

    SHA256

    da16b92efcb80b2c86ac8c6a4e94e56a55c59daafb709c103c10a16ee54c1ea8

    SHA512

    d8aa9a8a92f11bd527430d71a7228a8209fb7d75a8ce9beae81a01d4a5f65c14a7b7d5014cd67595f12123a0c9e7746d35ab88611049d055351e291dcd511a1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B0B1E3C3B1330A269DBEE4BA6313E7B4

    Filesize

    1KB

    MD5

    2ffbdb98df2a2b022a48adeb94a3af50

    SHA1

    6c86923b5c5832bb102f041cb7d38db397074f12

    SHA256

    dd12c5733bc4b682e1da6353c8c27650f53d11a8ada8fd8a2d06f23cecae5ebd

    SHA512

    a5f29661ac78ea205dd945fcc53e015152277426af4bcce688231ca1a564dc49144b2953409651737733fec72e9042468c780917543c007d7de74ed44058dbfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501

    Filesize

    508B

    MD5

    bc91b254781375abd189813e8a0c6a78

    SHA1

    0571051509bd2273e3561a5db794fad9685b246a

    SHA256

    879f719158bfc81f7efff4cf86e34d2c0395f507d610fbccb34a25627b81f533

    SHA512

    0f5e2a71bc188721f3d30aa05404bd9362acab2776463be9048f79bb8a0855a2b03ab05957c0f429c37ce4909de70d24a8c8deb5c16054829e2fe7e67cadd17a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f1695ebfe05d1f3f307b4a36520147d

    SHA1

    1eafc7fb32a5d3c874f12559a635e6d27d5d71b7

    SHA256

    0ef78a90678744237c11a35d6b33d0b6babedc4943735038bf900d1a52b99a38

    SHA512

    4c6fcfdc4c692535be84a0503aa303d2f0e39608699e56c81995f62b38521815e2cfc6ec959e3da2e3ffc47a2b3972f0018599c5a4c3dde622ffb41919d44d54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B0B1E3C3B1330A269DBEE4BA6313E7B4

    Filesize

    208B

    MD5

    89a23445bf6addb1f6ac0e1d130b2449

    SHA1

    3ff4e059ea3ff3246e70d2a0e1232e07b52da8ab

    SHA256

    d4965bbb6ede60775a6017fa543e60831c427a707f46695e5ea560cff08c6dc8

    SHA512

    6b13fe68d80d4768383aa924f2372a69b4ea09437dd498147d89bc0a20eb90824a81cf3d0552e853b5205dfb0e61acc2bd47bdbaf1ae58549bfd7e56f0aa304d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0

    Filesize

    440B

    MD5

    4d3a723ae0b7b541ec095b01baf03655

    SHA1

    7c8aed080ff1a74e8bee166ddade52ba5af2a45e

    SHA256

    3a97fda80eb5719f84fae1612308300b3ac2bfdc75b0105afe1c791bf1399b4c

    SHA512

    3d270bbecd0ea5bffe40148ff0016ed87ed2130821bdbbede1c08b62826c8b0022343a65159e212cad09f57380472b5957971fbfd69077ddacd3112937b11346

  • C:\Users\Admin\AppData\Local\Temp\CA3D4940-D25F-4361-8F90-AD04ED11F268\sender.exe

    Filesize

    249KB

    MD5

    6515c9b126f511ef84fe5e4b55b98c6d

    SHA1

    4b7a495a0528502ae1b46809337eed49b110738d

    SHA256

    ccd3a9708c6f066d5335de925963c1893b7e56207697b66008359beb9036b872

    SHA512

    bd4bce744c0c0a07e731dd1463f99b36f86d3497d82f17c00d6b505b8eb2396a4538cc8c7a1f585f587778e6754985ed1999d73b137497bc63693df127ca9555

  • C:\Users\Admin\AppData\Local\Temp\Cab2A3C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\YandexSearch00000.log

    Filesize

    34KB

    MD5

    7f36b759127b4d607ab9f8b0412260b4

    SHA1

    96b11ded7e9bbebdd457ff1ef88c44dd799b267e

    SHA256

    83ce00aa10cc733fb4f8a3fc305ed37fa7c153d759e5667ef8d8d67edb096b6b

    SHA512

    bbff7d3ca52d4140686bdc9a3f954e95f65e15a9b7a5de67752d41b48a4d91d5030754b1d43ce2dd57e0490844ffcf6990a8b3b5537ac2ff61a3bb50cb5a4517

  • C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml

    Filesize

    560B

    MD5

    d0c2024805704e7b692264fca3f6b89f

    SHA1

    fadf94566d1469c8f3d0983afbbd2888feb8235b

    SHA256

    20f99cb587c77c7e6e5f9874d8fdc48ed32a5a76fda5b73d00908cd8416348e3

    SHA512

    e62b2324bd165658224242baa60be05be99cc66b38620840a502d48f625ac4621dad379f8b8e66bd90239184a994f860b732ce3a78ac6a6e7dc62086d31bf680

  • C:\Users\Admin\AppData\Local\Temp\vendor00000.xml

    Filesize

    597B

    MD5

    0d7cedf37142a56b7fec17dcda63d7f2

    SHA1

    add7ec6987fa88b96ff3aa10f8d128acb0e3a20e

    SHA256

    acd9c8dced92bb2c52e3af0793c11ad0822f87a33329b2a290bcb482ff77237d

    SHA512

    5537a035cec27f3a0499f92e9dd03ae2a5e8f53ada411ec44898da6d58b3bd80dbd720d22a6b0e70540c52cfbce7ce3401e8e16c3f780d28a2d9de1815b7c54d

  • C:\Users\Admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msi

    Filesize

    8.3MB

    MD5

    0b72767d0f9dfe83cdfba359c7a4262a

    SHA1

    7cb0d55062aeaee327790d26509b2ed39c9c8141

    SHA256

    ffacf3711dfa7ac36fd4f8e7cb0110b741b378e62c47ac6fe2f0cca30ab615b1

    SHA512

    12305fc77c03260592ad37e8a6b57a63d8f01fd617f4883543a286ca88e02c060c17040a762a5213cd2a0a1bf7697272d1da426a6aeecd7cd53ac60307cd4733

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nahd6ha2.default\places.sqlite

    Filesize

    68KB

    MD5

    d57cd95de07d3b15eb5cf8baa80471af

    SHA1

    322c0e13f2022ab255a8d2a50c5835779b6ccc3e

    SHA256

    651efdc8961efbf6476e4cc4b3965a4da72690ebedda009fd800c6d936a67696

    SHA512

    2e98256a9e76ae384f88b83075a321f60cb13ee6f7e8cb93f1919103b82ba79a67b5eec8a7d3043fe26b377fae58545e82323813897c0e67adfacaa885d6f68e

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Bookmarks-2024500535.379600379.backup

    Filesize

    1KB

    MD5

    3adec702d4472e3252ca8b58af62247c

    SHA1

    35d1d2f90b80dca80ad398f411c93fe8aef07435

    SHA256

    2b167248e8136c4d45c2c46e2bff6fb5e5137dd4dfdccde998599be2df2e9335

    SHA512

    7562e093d16ee6305c1bb143a3f5d60dafe8b5de74952709abc68a0c353b65416bf78b1fa1a6720331615898848c1464a7758c5dfe78f8098f77fbfa924784c0

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Preferences-2024500535.379600379.backup

    Filesize

    313B

    MD5

    af006f1bcc57b11c3478be8babc036a8

    SHA1

    c3bb4fa8c905565ca6a1f218e39fe7494910891e

    SHA256

    ed6a32e11cc99728771989b01f5ae813de80c46a59d3dc68c23a4671a343cb8c

    SHA512

    3d20689b0f39b414349c505be607e6bfc1f33ac401cf62a32f36f7114e4a486552f3e74661e90db29402bb85866944e9f8f31baba9605aa0c6def621511a26af

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    2de0e08b92341609a23af8eb2038b077

    SHA1

    90f4733b6030140bb1d6a2b5414b26407704b49f

    SHA256

    43962cdd37aa530c9d14e90acdcdee2dba69144bbb39e8dd4fa0b541c6ade38f

    SHA512

    52b838e9c45ff7f746d57b96158ebaf92b80e0e10202e3cd3e76888029116b60e47ac58259a09abf14cd32ecfb5c93a5abd50e994cbd2e6bad2412b1c15ca4e7

  • C:\Windows\Installer\MSI2AE9.tmp

    Filesize

    172KB

    MD5

    743d6e05d8798ffd9c8387a212dfb484

    SHA1

    39b144771095ba33e674421fe5b31bf742beb0ef

    SHA256

    e9fa16a42930f6f50bfcdc5c284e53bf2ab08dbdb1dfeaa5131c6f7d60a14415

    SHA512

    538f92d237326fe2d2d07cb98141f5e565beb9640398f5bb41e7b8531d1a19f6f065761e55819a7a8d2be773533e960d53d854cb8b46efd04be88748df33915f

  • C:\Windows\Installer\MSI2B77.tmp

    Filesize

    189KB

    MD5

    e8a6a0d0f1ab61db4d24d9ba6a25d753

    SHA1

    131a3b9c11f2dc99c19f186eb921ef5d16a23cac

    SHA256

    c74a882c071bd9bd710be812ffd6e6b140b59fa714021159e91e7f6bb0e73e08

    SHA512

    33a2fdc6da1ce0117d2638f590cecb62477fa789dddbaf9cd2af17dd227687e3a172dab4c207a0154179e0ae62a64b2e8e6398d417369ef2b43db4e5f8966fd4

  • C:\Windows\Installer\MSI2D82.tmp

    Filesize

    202KB

    MD5

    ba84dd4e0c1408828ccc1de09f585eda

    SHA1

    e8e10065d479f8f591b9885ea8487bc673301298

    SHA256

    3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

    SHA512

    7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

  • \Users\Admin\AppData\Local\Temp\5DA9123D-C8C1-4907-A63C-2829E227CCC1\lite_installer.exe

    Filesize

    390KB

    MD5

    5235094a431ae6aea5860bb0909ea417

    SHA1

    8a904377319c6a76cae11af17bb0603663f318dd

    SHA256

    38d798db68ff089965c56ecf30783c37ed3b88ba5cdd96cf3bf851be37699358

    SHA512

    79eb9c5e82b6e8bb1013c1895a084c7058d46aa2b970222f7deb94d8f7d770019a488b99ca872dde12edd14b6ed9e67ddb2930b5051a3d7f98e8c9172c2f0941

  • \Users\Admin\AppData\Local\Temp\E17C1314-6D9B-45D2-A584-50C119B304EA\seederexe.exe

    Filesize

    6.7MB

    MD5

    f9df2f062bdb4c2be3a3129230103030

    SHA1

    9cc3b360f49962f4fd4dff057315fa5531210707

    SHA256

    4867db55dfebe3c66f907b0214c6a746c3ed774338c85999d756d2bcca00b76e

    SHA512

    1398c9c1b0b1be117fc082068d67aacbf0e9899c6dc424ab883f58d5deeb4cac75b42d1ba64c4a3a7f6553dd05dbb54e67b84215f3bb9b0a0e2fdaf76787be73