Analysis

  • max time kernel
    137s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 03:50

General

  • Target

    2024-05-05_4e33ce1f6a2f81ab2962781449e6eecd_magniber.exe

  • Size

    8.6MB

  • MD5

    4e33ce1f6a2f81ab2962781449e6eecd

  • SHA1

    9651b9586718f4db20969b7abea938f3f08a1b4e

  • SHA256

    3c35642eb268fa9f47f99a150c0dbb43bec1e262c4078e768cf51e6b408a069b

  • SHA512

    90901b141c9a7ebb0fc1e755e9de3296ea414873c0b4a68c20883d70a7dd17dd2ac0c22a45f1f105220532ab26d525159c3427a84958243298182768a77883e2

  • SSDEEP

    98304:U7cMZuyxXKNgR7YjTMbk+ust6tXHJwWkHmPh7gCNq7N2/wK0pmsCWrqufezvk/sZ:ZgK+lYMIstaiOgC8KVWrqufezvl

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 16 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-05_4e33ce1f6a2f81ab2962781449e6eecd_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-05_4e33ce1f6a2f81ab2962781449e6eecd_magniber.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3592
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5024
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C2EAD09EA198BD62CB1E7689CE1F4CDD
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Users\Admin\AppData\Local\Temp\A9400EE0-8053-4DD5-B357-B5D5674A23E1\lite_installer.exe
        "C:\Users\Admin\AppData\Local\Temp\A9400EE0-8053-4DD5-B357-B5D5674A23E1\lite_installer.exe" --use-user-default-locale --silent --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3400
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5E879773528D4216E41CC5CABDF0C7A0 E Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Users\Admin\AppData\Local\Temp\1EA0484F-D4AF-4EA4-BD8E-8F73F182A47F\seederexe.exe
        "C:\Users\Admin\AppData\Local\Temp\1EA0484F-D4AF-4EA4-BD8E-8F73F182A47F\seederexe.exe" "--yqs=" "--yhp=" "--ilight=" "--locale=us" "--browser=" "--browser_default=" "--yabm=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\6D096A5F-F7AB-436A-8397-67DD291F2954\sender.exe" "--is_elevated=yes" "--ui_level=5"
        3⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3600
        • C:\Users\Admin\AppData\Local\Temp\6D096A5F-F7AB-436A-8397-67DD291F2954\sender.exe
          C:\Users\Admin\AppData\Local\Temp\6D096A5F-F7AB-436A-8397-67DD291F2954\sender.exe --send "/status.xml?clid=2257102&uuid=2f7c9075-0276-4074-8bc4-12dee9ae1dee&vnt=Windows 10x64&file-no=8%0A25%0A37%0A38%0A45%0A57%0A59%0A102%0A106%0A108%0A111%0A129%0A"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e574e50.rbs

    Filesize

    591B

    MD5

    b8ba9c0bba228f3ad96f61734cfba446

    SHA1

    12a29828d31833f59ff731748f346ac993998d65

    SHA256

    f00cc66083c0e1d6ef7c93bb85c6a8eb168bdd94de3d9ef4167236c96a4a4221

    SHA512

    19480f606598163191d9085a36a1f6d9d29385599c6e99a7aa870bc1264fb45be9f20cae3935c1b67544daa6ec5606b2bdedff4b274b0178511ddf04f52eeea6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501

    Filesize

    1KB

    MD5

    11328a348d752e784815f061ce51dab5

    SHA1

    9e8d50eb943ae29cfc518c34f9278e67337454f6

    SHA256

    da16b92efcb80b2c86ac8c6a4e94e56a55c59daafb709c103c10a16ee54c1ea8

    SHA512

    d8aa9a8a92f11bd527430d71a7228a8209fb7d75a8ce9beae81a01d4a5f65c14a7b7d5014cd67595f12123a0c9e7746d35ab88611049d055351e291dcd511a1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\769F85394FB15C375FF89A7488274D5B_22252D7CC6CD0EA80FCE3FF30A53AFB2

    Filesize

    1KB

    MD5

    ea98a6ce25d3a8c6090d85eab3cf5b81

    SHA1

    e60cc7c794c0a236edfe8217bc43a5458d61261b

    SHA256

    268fc790c0a08e5dbba94bd912fa220ebd027ace41956cd71b83d73028b84023

    SHA512

    30a9838304bf4a494eca5296dd28b501d2c448f5f031e1cf703e7f338396655f713ec2584bc5dbd14104232e999928f77f89fad1c8c423df02ffaef806de05f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_4BB72A60CF9C652B353353202101C0E4

    Filesize

    1KB

    MD5

    620a1c6b22223c244b0f865f69523c95

    SHA1

    d200ab4f3c4e0df8d102ff23a3d0b8dcb34e79cf

    SHA256

    0edeef353604aaf6af04a8fba9931fd0772a9963d142c28b0a5ddd50ec338060

    SHA512

    e805ce01052ca1a672e8ff3b9c50c493bc26bfb1efdecbb2eed27bd99a89db9806adaf08f74db98a0efdd6c3d4cab77f27d78cf26789fc306e9314f97f7adfbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B0B1E3C3B1330A269DBEE4BA6313E7B4

    Filesize

    1KB

    MD5

    2ffbdb98df2a2b022a48adeb94a3af50

    SHA1

    6c86923b5c5832bb102f041cb7d38db397074f12

    SHA256

    dd12c5733bc4b682e1da6353c8c27650f53d11a8ada8fd8a2d06f23cecae5ebd

    SHA512

    a5f29661ac78ea205dd945fcc53e015152277426af4bcce688231ca1a564dc49144b2953409651737733fec72e9042468c780917543c007d7de74ed44058dbfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501

    Filesize

    508B

    MD5

    2348c7f2d44b8921bcdda038fb28b67d

    SHA1

    d7780ebb7f68b218d04903dfb585567f3233c659

    SHA256

    271c1bcff53561ab4c99d5a49d6429a58825b92cb48660161116a6a44f730f7b

    SHA512

    524e2eb567fddfba01ad0c74f9a86e4ea05c384bedc4f867c0308f52615b1c3a205cf26577295104fc4b30d02af2f3c5d8e96d4e3798dddbb13e99f71da6c959

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\769F85394FB15C375FF89A7488274D5B_22252D7CC6CD0EA80FCE3FF30A53AFB2

    Filesize

    522B

    MD5

    e5857c15e2fe1243100d0f23b66c99f6

    SHA1

    bca4bf50c07adf783f2c11d05c1c15db87c215b1

    SHA256

    39f196de4b01464e0691917233a84d6aa1e5fd631b6776776c2d54cf82e814e9

    SHA512

    7f12fb53a1305b7b0bada82c24fc988723146ff831cc77231159d78ba97b0ba6a811ecaccc1ea0dccbc998ecb09dfccffc19a5e3cccabdd39d2f461aa188705f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_4BB72A60CF9C652B353353202101C0E4

    Filesize

    502B

    MD5

    44465dd2cbfd6e05b14220a8d56e1a30

    SHA1

    a56bde685c10be184b7dc08758cd1ed030e3a8ed

    SHA256

    0354e9fd47e447495db10c6ce3c7f68ca61b014ad379206fb350b38de53f3396

    SHA512

    f2545fa17ed063cb05e4d178e582da1c51a1deeb7acc044d41e040fdc2e354c2151c75c3f497c9ff9a39637c637ae2b45d1b48f2a28992f813dd566b5c22299e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B0B1E3C3B1330A269DBEE4BA6313E7B4

    Filesize

    208B

    MD5

    4bb267d49ba1e8007a51f89f9445c93e

    SHA1

    0286802fca731e6372d26a52d2404475392bdea9

    SHA256

    a50ac5f61124aa82f3cae04f764d5a22a8be23c8335982a14e7be528b01ba369

    SHA512

    4a5c4e3bd5af8dd26cfefc4191758011cba44506d2f3ac04f476cef958fa238dc0f34c8a64e504fb909478cfeef15aa59f8a0650034743ae87cfcb81007e417d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0

    Filesize

    440B

    MD5

    7531cdf5f66c82cf190ccf8303908fd0

    SHA1

    f08951dc33052ecc2af9154f570e21fcca899773

    SHA256

    6cba93e8b3e0e7a83d776b322cc5a136874b96cd87914db52f72f626189c981b

    SHA512

    a47adabc33667672d52864ef214766a0a857eebca958e4077757e9078b1b0d28219b18e36d2e7355c7439d536bd973ee31e6fbb904fb025ca445bfa9041100fb

  • C:\Users\Admin\AppData\Local\Temp\1EA0484F-D4AF-4EA4-BD8E-8F73F182A47F\seederexe.exe

    Filesize

    6.7MB

    MD5

    f9df2f062bdb4c2be3a3129230103030

    SHA1

    9cc3b360f49962f4fd4dff057315fa5531210707

    SHA256

    4867db55dfebe3c66f907b0214c6a746c3ed774338c85999d756d2bcca00b76e

    SHA512

    1398c9c1b0b1be117fc082068d67aacbf0e9899c6dc424ab883f58d5deeb4cac75b42d1ba64c4a3a7f6553dd05dbb54e67b84215f3bb9b0a0e2fdaf76787be73

  • C:\Users\Admin\AppData\Local\Temp\6D096A5F-F7AB-436A-8397-67DD291F2954\sender.exe

    Filesize

    249KB

    MD5

    6515c9b126f511ef84fe5e4b55b98c6d

    SHA1

    4b7a495a0528502ae1b46809337eed49b110738d

    SHA256

    ccd3a9708c6f066d5335de925963c1893b7e56207697b66008359beb9036b872

    SHA512

    bd4bce744c0c0a07e731dd1463f99b36f86d3497d82f17c00d6b505b8eb2396a4538cc8c7a1f585f587778e6754985ed1999d73b137497bc63693df127ca9555

  • C:\Users\Admin\AppData\Local\Temp\A9400EE0-8053-4DD5-B357-B5D5674A23E1\lite_installer.exe

    Filesize

    390KB

    MD5

    5235094a431ae6aea5860bb0909ea417

    SHA1

    8a904377319c6a76cae11af17bb0603663f318dd

    SHA256

    38d798db68ff089965c56ecf30783c37ed3b88ba5cdd96cf3bf851be37699358

    SHA512

    79eb9c5e82b6e8bb1013c1895a084c7058d46aa2b970222f7deb94d8f7d770019a488b99ca872dde12edd14b6ed9e67ddb2930b5051a3d7f98e8c9172c2f0941

  • C:\Users\Admin\AppData\Local\Temp\YandexSearch00000.log

    Filesize

    35KB

    MD5

    e6c671adf1a178360a360e1967b3dc5e

    SHA1

    fd677547c45802d61283f7340ef8848f37b3829d

    SHA256

    752d9ac43e220dcf895c9b61729fe27eef9a2078fd0b10a8bd6e3a7fb840c213

    SHA512

    6eef123f90a287842346f20206bb5f0ede0ca30144d4827695bace7860d309abb46507eec1a3a338c6f4f35795192b65596b3d8038ac112d6ccc23a26b9886f0

  • C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml

    Filesize

    560B

    MD5

    d0c2024805704e7b692264fca3f6b89f

    SHA1

    fadf94566d1469c8f3d0983afbbd2888feb8235b

    SHA256

    20f99cb587c77c7e6e5f9874d8fdc48ed32a5a76fda5b73d00908cd8416348e3

    SHA512

    e62b2324bd165658224242baa60be05be99cc66b38620840a502d48f625ac4621dad379f8b8e66bd90239184a994f860b732ce3a78ac6a6e7dc62086d31bf680

  • C:\Users\Admin\AppData\Local\Temp\vendor00000.xml

    Filesize

    597B

    MD5

    0d7cedf37142a56b7fec17dcda63d7f2

    SHA1

    add7ec6987fa88b96ff3aa10f8d128acb0e3a20e

    SHA256

    acd9c8dced92bb2c52e3af0793c11ad0822f87a33329b2a290bcb482ff77237d

    SHA512

    5537a035cec27f3a0499f92e9dd03ae2a5e8f53ada411ec44898da6d58b3bd80dbd720d22a6b0e70540c52cfbce7ce3401e8e16c3f780d28a2d9de1815b7c54d

  • C:\Users\Admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msi

    Filesize

    8.3MB

    MD5

    0b72767d0f9dfe83cdfba359c7a4262a

    SHA1

    7cb0d55062aeaee327790d26509b2ed39c9c8141

    SHA256

    ffacf3711dfa7ac36fd4f8e7cb0110b741b378e62c47ac6fe2f0cca30ab615b1

    SHA512

    12305fc77c03260592ad37e8a6b57a63d8f01fd617f4883543a286ca88e02c060c17040a762a5213cd2a0a1bf7697272d1da426a6aeecd7cd53ac60307cd4733

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nahd6ha2.default\places.sqlite

    Filesize

    68KB

    MD5

    d57cd95de07d3b15eb5cf8baa80471af

    SHA1

    322c0e13f2022ab255a8d2a50c5835779b6ccc3e

    SHA256

    651efdc8961efbf6476e4cc4b3965a4da72690ebedda009fd800c6d936a67696

    SHA512

    2e98256a9e76ae384f88b83075a321f60cb13ee6f7e8cb93f1919103b82ba79a67b5eec8a7d3043fe26b377fae58545e82323813897c0e67adfacaa885d6f68e

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Bookmarks-2024500535.452555452.backup

    Filesize

    1KB

    MD5

    3adec702d4472e3252ca8b58af62247c

    SHA1

    35d1d2f90b80dca80ad398f411c93fe8aef07435

    SHA256

    2b167248e8136c4d45c2c46e2bff6fb5e5137dd4dfdccde998599be2df2e9335

    SHA512

    7562e093d16ee6305c1bb143a3f5d60dafe8b5de74952709abc68a0c353b65416bf78b1fa1a6720331615898848c1464a7758c5dfe78f8098f77fbfa924784c0

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Preferences-2024500535.452555452.backup

    Filesize

    313B

    MD5

    af006f1bcc57b11c3478be8babc036a8

    SHA1

    c3bb4fa8c905565ca6a1f218e39fe7494910891e

    SHA256

    ed6a32e11cc99728771989b01f5ae813de80c46a59d3dc68c23a4671a343cb8c

    SHA512

    3d20689b0f39b414349c505be607e6bfc1f33ac401cf62a32f36f7114e4a486552f3e74661e90db29402bb85866944e9f8f31baba9605aa0c6def621511a26af

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    4db5809f39d62df00c32abaf0490ff08

    SHA1

    b277601f48715587ef1fa4dc3e82eeeb19fb938b

    SHA256

    f15a854923cd13a5d733b1c1bc08e09b056ab7165aeda1fb1d8edb840475a76c

    SHA512

    52ccdea45dba2b773f6d0fbe66a204a473d237e11dc9022837172ea3e8fe6b4c9576c90c589b61344c2ee704b6889ad52fde21a803a4682a6b5f753d293b764b

  • C:\Windows\Installer\MSI50CF.tmp

    Filesize

    172KB

    MD5

    743d6e05d8798ffd9c8387a212dfb484

    SHA1

    39b144771095ba33e674421fe5b31bf742beb0ef

    SHA256

    e9fa16a42930f6f50bfcdc5c284e53bf2ab08dbdb1dfeaa5131c6f7d60a14415

    SHA512

    538f92d237326fe2d2d07cb98141f5e565beb9640398f5bb41e7b8531d1a19f6f065761e55819a7a8d2be773533e960d53d854cb8b46efd04be88748df33915f

  • C:\Windows\Installer\MSI513E.tmp

    Filesize

    189KB

    MD5

    e8a6a0d0f1ab61db4d24d9ba6a25d753

    SHA1

    131a3b9c11f2dc99c19f186eb921ef5d16a23cac

    SHA256

    c74a882c071bd9bd710be812ffd6e6b140b59fa714021159e91e7f6bb0e73e08

    SHA512

    33a2fdc6da1ce0117d2638f590cecb62477fa789dddbaf9cd2af17dd227687e3a172dab4c207a0154179e0ae62a64b2e8e6398d417369ef2b43db4e5f8966fd4

  • C:\Windows\Installer\MSI52EC.tmp

    Filesize

    202KB

    MD5

    ba84dd4e0c1408828ccc1de09f585eda

    SHA1

    e8e10065d479f8f591b9885ea8487bc673301298

    SHA256

    3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

    SHA512

    7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290