Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 05:50

General

  • Target

    2024-05-08_7697c7435788530de7deeada91d41215_bkransomware_magniber.exe

  • Size

    6.7MB

  • MD5

    7697c7435788530de7deeada91d41215

  • SHA1

    54a6a6bd10b14eb46ed01d3a9542a31c24896491

  • SHA256

    43a000f5cb61d88165a88638072c43a35c840a22c85bdebee6fcbf18fa1d01f8

  • SHA512

    92ddcfb6bc04e99ee379916c416d41caddb7ac3bc73828651b6b9da595b8e3c5b162537623407f4fb7f834e51c62a1869d207c1a96ba751ce0774ed71b8c70ca

  • SSDEEP

    98304:o/AH+HGh2ZzVlvoFAvyIwZ8UX8Un8UXgeEeg/NK:RH/QBJE8UX8Un8UOK

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 23 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 20 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-08_7697c7435788530de7deeada91d41215_bkransomware_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-08_7697c7435788530de7deeada91d41215_bkransomware_magniber.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3000
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 89AA1BB2F40F99035227A6D4058671A7
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Local\Temp\D6CE0EEE-6CE7-4901-AF7D-17831771E48A\seederexe.exe
        "C:\Users\Admin\AppData\Local\Temp\D6CE0EEE-6CE7-4901-AF7D-17831771E48A\seederexe.exe" "--yqs=" "--yhp=" "--loglevel=trace" "--ess=clid=2256411&uuid=%7B6729E28E-396F-4460-B44A-10DB9DE019A5%7D&cntp=0&jntp=0&intp=0&lntp=0&pntp=0&llntp=0&fntp=0&entp=0&ontp=0&cbl=0&gbl=0&vnt=6.1x64&file-no=38%0A106%0A25%0A6%0A47%0A37%0A102%0A" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\25C86E61-8C58-4780-8A8E-841D260EA5A4\sender.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Users\Admin\AppData\Local\Temp\25C86E61-8C58-4780-8A8E-841D260EA5A4\sender.exe
          C:\Users\Admin\AppData\Local\Temp\25C86E61-8C58-4780-8A8E-841D260EA5A4\sender.exe --send "/status.xml?clid=2256411&uuid=%7B6729E28E-396F-4460-B44A-10DB9DE019A5%7D&vnt=6.1x64&file-no=6%0A25%0A37%0A38%0A47%0A102%0A106%0A129%0A"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2912
      • C:\Users\Admin\AppData\Local\Temp\FDA68E47-6CEF-429E-904C-78ACD24B491B\lite_installer.exe
        "C:\Users\Admin\AppData\Local\Temp\FDA68E47-6CEF-429E-904C-78ACD24B491B\lite_installer.exe" --use-user-default-locale --silent
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2380
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A5E1D7DC03C324BBF1C4A33185560E24 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f7618d0.rbs

    Filesize

    1.3MB

    MD5

    d4650d959e53542b6fa045797a627491

    SHA1

    5721d735ca5ca88d4945dc5712a2393f995e14ae

    SHA256

    3a59ffe9e43dca1fd5d6a1f4b5b03de3a705736f735a9d1ade1e89228c0a22c5

    SHA512

    c9a32383e95e14877e51c146d8a738037adcc96e313ada3990484e03dad1f36909f027d39491684a8e52621f84587c21d8f1d235ce6b464a55422d8df967301e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3B179347615B32FE859CEABBE50C3EE6_8E70042F884A67193ED52832BA9E5354

    Filesize

    1KB

    MD5

    072495fa39b16e164b0a609b6c7db240

    SHA1

    5d7bd841b4c11962a74deb0c061b8b169375e620

    SHA256

    34d3ecaeac717a7617082c46308eeddec07bc77b4144b0303585ee3c39c72d49

    SHA512

    664d816f6f038a67a7588851a4598a5d9ce7da2b508a23f361cd7f0afc87d267b8ac9cb0a0968a3f375542e60246a654f0aab0431a08442b746da5c0ff6b451f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E7EC0C85688F4738F3BE49B104BA67

    Filesize

    1KB

    MD5

    2365869258df7a66a2121b802ca4afd9

    SHA1

    73acc30a2edeb9d6830de559bb8a74f35168135d

    SHA256

    d6b1932822bbd72a8e78c771717d992142348f67d625a42393719fefbe59b0ed

    SHA512

    795004bab536e128dbd81c188976d37c7b650efbfa5a80374df4c65a1049c27658f4620b7605583928eb167fcb69b4c99e4c8730c507b824a7bde9c7fb0e21f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3B179347615B32FE859CEABBE50C3EE6_8E70042F884A67193ED52832BA9E5354

    Filesize

    538B

    MD5

    ef1b073128aef0661c3260de52e500f8

    SHA1

    cd64a1877ceaa5e2b46b177f36707343d6f19f10

    SHA256

    d0a81dd1f650b1627d0ecf73b2899fbcddd53338f6efdfecdc48f3053b78de42

    SHA512

    9a90a246a3d71095edfd1c87476f73d5f202f14f34a9e7b50cb7fb33f8b7a01779f7a82a289cb216148fef1fb816a9e69ea9f16177c974a0efd0b25994fee18b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e879c2a3898cd545b8faf099bb902f45

    SHA1

    09023b01d4ccd6a08f4b11653418c73e49249e17

    SHA256

    af25f782a9faf5d273b6d4141a4c4cb75f9fad0e16e5dcf73c1b69712087aa4c

    SHA512

    160e01473e8b840bcf0e277f6e49a496fc8e30667945a2933712d4aa23c5f9c75c96220fd5c8302067c864887b8edfc25317592a541f6fe50a3c23a0a0cc4a4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E7EC0C85688F4738F3BE49B104BA67

    Filesize

    186B

    MD5

    e500ec9a0066c8e375bcefd66dd2f014

    SHA1

    dabe1722dbb01356da70f0d4f7233ef40bc7c7e0

    SHA256

    8876b05a54ac8428c787381e59024da29618608bb7b27243150cab78181c4e18

    SHA512

    8b075c9d9a7cfe629fdaef34e8c9a44e82a915f19f5b6862e82b45c62908702c0ce17c6420120c7fa05cc11cc8ca6943c5ac4a8bb578151bbd046ffd17ef0859

  • C:\Users\Admin\AppData\Local\Chromium\User Data\Default\Preferences

    Filesize

    30B

    MD5

    2b32a558d9e95cc9a3c708afc4d78fbf

    SHA1

    b3073050732486ed35b20e22e05c6f09744f4e4d

    SHA256

    39d672b6d3b0919ac9fc37864c26f7ef6ceb8b6289f4c9e2a25b023581872b20

    SHA512

    66322e344e3cc7de7c23905fa807b9148fd2433979726e54ffbbe81ca643496f0ec28c0319b6944832cdf6bb6f01252f63da98ddb92124cb74d1fdf8d3f65567

  • C:\Users\Admin\AppData\Local\Chromium\User Data\Local State

    Filesize

    83B

    MD5

    beba89380690f7d54354290642add52b

    SHA1

    3ab5ea75b822de4f0df59c3de5030bcbdd89bf7d

    SHA256

    ac4f380f765cdab18c9fc9a00f10ea9ed0ea3888e8217e0015b6474c64380311

    SHA512

    516bde8f8e22574aef4ebde9e86250b46e21991fdb4441b984fbdb0798713118708dae561e35ef4fb854596140f997b64d59e928f62017d58dd86be110cf6142

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

    Filesize

    5KB

    MD5

    0c646fb6398325ec784173f4f8721f38

    SHA1

    0eb08ee9405dbb220c703d647e1ef71dc3613e7e

    SHA256

    39bc05f1a3e34b9e7e3f445ce91cb2767b04459352822d753d308c26817b82f1

    SHA512

    2f5385a6f4325cac4f44433413eccb9aff36ed445bba6fd854ff2a3c265e058afc7272c4f3e01d4c37c915ddc5ab1279c9dd824933144d96a65ba9a842468755

  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

    Filesize

    6KB

    MD5

    e6e50c900da52ff50e20dd03c70a82c6

    SHA1

    3655afa0f76b77a9cb3ce446c1127542bb523512

    SHA256

    9c5b5d8473ab6c27a081c88997508e55706bd6d68831e75652b1744290ba634e

    SHA512

    1153b5f685f90d5a04cad2793c05eecd56780290f7e24daea23d6025dfdee8d3265829ab58b62acdea200131499569cb0cd3a600f3a129049a9797e0bcb5b640

  • C:\Users\Admin\AppData\Local\Temp\2.12.1.2356 (PARTNER)\#Bar4IE.cab

    Filesize

    104KB

    MD5

    1093f0ca05e5a07170af9c125d4da530

    SHA1

    1b3ba5a930e7ed7fcb6ae7e6acbe241b510ce858

    SHA256

    8053cb0deff7b2c6e9891ce9e27eab14e40e644c2141f536da2cfc316add250c

    SHA512

    2383d89648df5e5e83d15ca188a3e46e3683516f84cdf5be6aea9bc75d974630937688ab556fdf577189526698152af92b4757b86a9eb6afeb5d5fa481f5220b

  • C:\Users\Admin\AppData\Local\Temp\2.12.1.2356 (PARTNER)\[email protected]

    Filesize

    496KB

    MD5

    a80e0ced440101213135763568e54f3b

    SHA1

    57f345136edef9f8894e72f548e2c25281c3aa87

    SHA256

    863670992230d231d1801db95c58b3b660eafd7e1529af7cfe7ed395c2964302

    SHA512

    ad186e6724e5cd35657774c89c3715d61de0df8f3e1978cf797491f400dafc4f9b50da18288accf99f85db64418ba8eb3303db87a04a97fc99c7299cbb40f0f3

  • C:\Users\Admin\AppData\Local\Temp\2.12.1.2356 (PARTNER)\stdout.log

    Filesize

    40B

    MD5

    37c6ab48c0c7876df5693169833bad8a

    SHA1

    a2c034cb3d510c51af306ad95c31a4011e68d9b2

    SHA256

    8219fca02b42efa433038a9d5f22eded19cacc05d656cd6f2b439530f2474aba

    SHA512

    8972178e305362b862f37b84bf3391f879ce69ddefe41830a25b76989bf03e434a97a54961a8205e476040fc67a4edb98ff78d4aa5e528e097d9c62dac3a0e75

  • C:\Users\Admin\AppData\Local\Temp\2.12.1.2356 (PARTNER)\[email protected]

    Filesize

    1.7MB

    MD5

    4dcca932664c84d2def388f0e33729ea

    SHA1

    cfe6203621ce9f3936f04a1a8d9ff7077e2fe8fe

    SHA256

    df4c9a77a686630d1a3d7c3a338dce8fa3b066049214699faf5680acaf7d0f97

    SHA512

    e696f4816d821265adaf06c1d45087f44b0ca16bd398fc344e86559caf53c37d286f1a6f8939dde033dbede14098f7dfbd998387db4f648b5bc518b13ab707e0

  • C:\Users\Admin\AppData\Local\Temp\Cab194B.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\YandexSearch00000.log

    Filesize

    33KB

    MD5

    97101c75c04d36f4a06f57737f8f4f8c

    SHA1

    bcae062c5242156e6487dd226692db9e10ae0e62

    SHA256

    a51ebef12bc80bed1945cb2e7ddce0ea009f15df1f2f67a92f9d5f394103c631

    SHA512

    74a41f24d860900471da203593a5c5c1d387ec34890bd9ccc44efc0951d9fd20575b96dbb26bee90496407edc9bf04abb247bc81b31403f18d75d03e68114ab8

  • C:\Users\Admin\AppData\Local\Temp\vendor00000.xml

    Filesize

    591B

    MD5

    8bccc6032a9ef99924bb49715774922d

    SHA1

    52523e8c17f12962f26a6ffe18d8a3adf332dc77

    SHA256

    9f416f3a75d425daa1ae1ca1ace5ccb45316c95009650a4a938e5317dc073677

    SHA512

    34c6a585ec16885b29601b4ddef1117a1528b33f601bf7b329651f323644687473f3a58fb1732616027c65eb6070a515e6e7b78cff0e7604968c03ae5b4148de

  • C:\Users\Admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msi

    Filesize

    6.4MB

    MD5

    3293f65e20e2a8f067b9a5c67e0b5350

    SHA1

    0042d114a75bf21c7a478ad148466c1d52e55897

    SHA256

    2dbcca21ee65ad1c29089d9e8bd1e436eddd8eb4dfdb1a6a5e169f3b27a36eb5

    SHA512

    9f77ec5c29859d818399950e4a2af2ceaee0fc6b2306140e4ae88096192c416c2d46c4714eeeb3443997641bf78d148b2f0041dba65e8102a3734726e279ffaa

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ty9peokp.Admin\prefs.js

    Filesize

    219B

    MD5

    903e8a03e317cd696cef79117cc08aa5

    SHA1

    2a421a1ec11c3691cae8f9731153637f487b4bd9

    SHA256

    0e6050b4d3fb2572ec6077b6012533392d62f4495c858dda326e2e2f6f7a461c

    SHA512

    b0d85b8addfa1933f687703f8f1f357ec68e44775bf95f9a382c273a2305f1a588b963fdc427e9615db7415e9096ad002289e86fe5f91f62d30c238b1ddc151c

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ty9peokp.Admin\yandex-extensions-data\clids-vbff.xml

    Filesize

    554B

    MD5

    0a77e0095494e89ce162e5b1eae2296f

    SHA1

    d335c3657dc8a490512f51f504f75e765b201337

    SHA256

    8d6235f0f001cf0eda07e5a00a9e1104f56966f634f2a2b27923273b340cc966

    SHA512

    6afef3eb2e04891e57882da783290cdb30317ac09bb8a42669795e3c65a42da0c540a92dae0dfabed8c5a7d57e19779b7528db77dbab81040346839c0451b975

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ty9peokp.default-release\prefs.js

    Filesize

    6KB

    MD5

    f5e11de39f74475fc8eb682988587453

    SHA1

    0e89a79e50ea4d284ab319940c6bcf8b23dbf957

    SHA256

    ea0762213168dd01610b58e6044b46418c6969af28dc4b265677047f0bd0d6fb

    SHA512

    0a7cd387a8248d938c8f4be22646e963c1f7cb5c62f353919e8029900296dfaa637b12bc9f0867d8b230dd731c739ec2417d1d5e07cae38692dc06951db6abc6

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    a03d898b00171eb58fe0356ae3545914

    SHA1

    ac6bb952c1164fc7ed3e38cd10b88c71215f42a7

    SHA256

    3a569797a63ebccebc30c8d96256435317c4ea22c408876ecd972e21df7199a7

    SHA512

    19e67e2c25cc24a9605d3ec8ea1b1ddff486f77d60797b9817c827d8d8bfd6784998f14b04b8cb6d2cfb5b37841a834b189f79fa7df1d8c0675b6b435c49c2ee

  • C:\Windows\Installer\MSI19D9.tmp

    Filesize

    152KB

    MD5

    d7194cce0acb36242678fe14f0b593a5

    SHA1

    8f4c1c82a0d171eaa6b8b5e72669e4cebda62422

    SHA256

    3079088d87505fb30f18593345a36c0977d2c84471fd6f00ec7c529ba260239c

    SHA512

    1191fdfbbf592c9dc519c2eb906e6c8dabfd3b9b8d22446a4c646654b3453d867d2e9cc85591ed2c29bc0d8a09357ef885d92731eb1cc68ad5e7cde3bbf8d313

  • C:\Windows\Installer\MSI1A67.tmp

    Filesize

    160KB

    MD5

    eb68dff1de027023aad354ab4b83c0a5

    SHA1

    9bff33e69584b1873a36de7472a5f7b9eb815c5f

    SHA256

    c9ea99c557ed4c3c3019f07b4271e4f148f8ee61be0dcb3ca3ce19e876f61bd5

    SHA512

    63a6759bae94b29f8a017e611c89fd2dd49b7b3bf64d660d8aab5817f5af605850cb8fec7c2865794b5dec46c560b13926f1dfea8cd979bb905bc6d42ae9a42d

  • C:\Windows\Installer\MSI1B24.tmp

    Filesize

    1.2MB

    MD5

    9b17a6f0362a7f6cceb4eaa41dfd527f

    SHA1

    e9bdd20cec22e8d6f21d2782ff2ca5fbca8a62c4

    SHA256

    18c58d002823249659c4fd9ffab02702c64b75cb688cecdbb1797a623f8c893b

    SHA512

    40f5c1247bd93adbd1dc982c94f8a22a1e9f3a0b836c435d762c5772367709aeef598b44003ab6bc9a414eec1896f4408a0afae3256f40957034e536c1d38b9c

  • \Users\Admin\AppData\Local\Temp\25C86E61-8C58-4780-8A8E-841D260EA5A4\sender.exe

    Filesize

    217KB

    MD5

    515bacbf4089f76835701f7d54ffd10d

    SHA1

    26365deb5f7bac4dfc3bd2c49f24d5f7ca9e5d9a

    SHA256

    261f9bf83bcca61a778a6f8ce6f44fcafa7730e2c0103707a1b9120b43d463d6

    SHA512

    3bc7f47f71c96ff199403c328833ec497d553f3e8d5cc78153832f926869e548535ca8478a1c54b880ec9be34a75f0958f4f863627a623517517168c243e817d

  • \Users\Admin\AppData\Local\Temp\D6CE0EEE-6CE7-4901-AF7D-17831771E48A\seederexe.exe

    Filesize

    1.5MB

    MD5

    6b7dbe77b944e2f2f713b1a7b1a78a7d

    SHA1

    a5f862319abe681f42395f203d106b7627732a9e

    SHA256

    1e748d4bb0ef06671baf8d0f1dc87f32593a5e38ea28bcf4ac34f2b0aaa422c2

    SHA512

    28a21ca99df1f1166ac842b5896943b6bf3a8d8b62836e8f640eeaf38926d2a379dffaed39132016df0adc14ded1bc23c85f09be6f09fe291c2a6a656b813e2a

  • \Users\Admin\AppData\Local\Temp\FDA68E47-6CEF-429E-904C-78ACD24B491B\lite_installer.exe

    Filesize

    360KB

    MD5

    6aef23d9b019e4c4adda6dd4c26acd0f

    SHA1

    eb2f591f88be7d868a2c8b0b05e6946f44311692

    SHA256

    30daba3c1086ea7203f278ce9fc4274b2081eca655458b4832a8075a2412652e

    SHA512

    7b34a5a701c6aeeb065eca7f70c3d2304f2ed1ba2f1c9bf87b09e3ba25e90b8a049ed3246fa194bea5fdc982e31a72e9a83e8adad12cde6822400360d1562902