Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe
-
Size
3.3MB
-
MD5
4acc6ba77918686895c160d1c006009e
-
SHA1
99a0da7eb873008bd4bc8dc432cae70abce44d0f
-
SHA256
218245e02f4bff4470cb7771d69fb2f30fbf90a442beeab6b45d87190ba98523
-
SHA512
d44aa9f8c5ed7ffbf8fcbc1bd6c43ed4665dd9fa25e4aa25678ee23e7d59dc3794cde0ea8b0f94b250a63890464e40b7bf614845b292d5dea4bf8038c19d8525
-
SSDEEP
49152:NYluUHuOXieTE9GJfrzAJ5m7qnjJA0f9LOsZ12G3WjaEj+bFr3z0L7:NYkUOO6WrejJL9L3T2G3Wj/iJre
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E3210B6A-AEA7-2977-FDAD-F4ABCA591F89}\ = "CLSID_HtmlDocForParsingSiteUnmarshaller" 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E3210B6A-AEA7-2977-FDAD-F4ABCA591F89}\Implemented Categories 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E3210B6A-AEA7-2977-FDAD-F4ABCA591F89}\Implemented Categories\{00000003-0000-0000-C000-000000000046} 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E3210B6A-AEA7-2977-FDAD-F4ABCA591F89}\InProcServer32 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E3210B6A-AEA7-2977-FDAD-F4ABCA591F89}\InProcServer32\ = "%SystemRoot%\\SysWow64\\UserDataPlatformHelperUtil.dll" 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E3210B6A-AEA7-2977-FDAD-F4ABCA591F89}\InProcServer32\ThreadingModel = "Both" 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E3210B6A-AEA7-2977-FDAD-F4ABCA591F89} 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1632 ONENOTE.EXE 1632 ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1632 ONENOTE.EXE 1632 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe Token: SeIncBasePriorityPrivilege 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe 2328 2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1632 ONENOTE.EXE 1632 ONENOTE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-08_4acc6ba77918686895c160d1c006009e_magniber.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2328
-
C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE"C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1632