Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 17:22

General

  • Target

    2024-05-08_9fabd00938b9ef6aadbdaad56e75a78c_magniber.exe

  • Size

    3.3MB

  • MD5

    9fabd00938b9ef6aadbdaad56e75a78c

  • SHA1

    a31e52d9496f2ec1ef73a8bbaf45517b912a30f6

  • SHA256

    854d19942fafa8d928eed0a5f2d59fdd3090a2eb05addd4ef644679d1cf7054a

  • SHA512

    3bbafacc2f7674e4e350be3184bb4acd1778fbecabe48d4b1ed3c97cae4fab5089922477750b9afa3b0aa5ec90ada5f0ce45e2db99c5dda56acc645c4829df6d

  • SSDEEP

    49152:gT+zOkNAOgiKT6JKS1j3DR5m7qnjJA0fQuo4ygC/inEj1nfLf3CHyOf6k3lLftVv:m+qkKO1J/3ZjJoEE5fLKH3yKLtVQp6

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-08_9fabd00938b9ef6aadbdaad56e75a78c_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-08_9fabd00938b9ef6aadbdaad56e75a78c_magniber.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:836
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4372,i,6576818814118437872,11004518367271063231,262144 --variations-seed-version --mojo-platform-channel-handle=3764 /prefetch:8
    1⤵
      PID:4744
    • C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/836-33-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-24-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-2-0x0000000002D70000-0x0000000002F7D000-memory.dmp

      Filesize

      2.1MB

    • memory/836-14-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-15-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-13-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-16-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-19-0x0000000002D70000-0x0000000002F7D000-memory.dmp

      Filesize

      2.1MB

    • memory/836-18-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-17-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-21-0x0000000002D70000-0x0000000002F7D000-memory.dmp

      Filesize

      2.1MB

    • memory/836-22-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-1-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-63-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-25-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-26-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-27-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-28-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-29-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-30-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-31-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-32-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-8-0x0000000002D70000-0x0000000002F7D000-memory.dmp

      Filesize

      2.1MB

    • memory/836-23-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/836-64-0x0000000000400000-0x0000000000A10000-memory.dmp

      Filesize

      6.1MB

    • memory/1620-34-0x00007FFE7B330000-0x00007FFE7B340000-memory.dmp

      Filesize

      64KB

    • memory/1620-37-0x00007FFE7B330000-0x00007FFE7B340000-memory.dmp

      Filesize

      64KB

    • memory/1620-38-0x00007FFEBB34D000-0x00007FFEBB34E000-memory.dmp

      Filesize

      4KB

    • memory/1620-39-0x00007FFE7B330000-0x00007FFE7B340000-memory.dmp

      Filesize

      64KB

    • memory/1620-40-0x00007FFEBB2B0000-0x00007FFEBB4A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1620-42-0x00007FFEBB2B0000-0x00007FFEBB4A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1620-36-0x00007FFE7B330000-0x00007FFE7B340000-memory.dmp

      Filesize

      64KB

    • memory/1620-44-0x00007FFEBB2B0000-0x00007FFEBB4A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1620-45-0x00007FFEBB2B0000-0x00007FFEBB4A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1620-47-0x00007FFEBB2B0000-0x00007FFEBB4A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1620-48-0x00007FFEBB2B0000-0x00007FFEBB4A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1620-46-0x00007FFEBB2B0000-0x00007FFEBB4A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1620-43-0x00007FFEBB2B0000-0x00007FFEBB4A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1620-49-0x00007FFE78B20000-0x00007FFE78B30000-memory.dmp

      Filesize

      64KB

    • memory/1620-50-0x00007FFE78B20000-0x00007FFE78B30000-memory.dmp

      Filesize

      64KB

    • memory/1620-60-0x00007FFE7B330000-0x00007FFE7B340000-memory.dmp

      Filesize

      64KB

    • memory/1620-61-0x00007FFE7B330000-0x00007FFE7B340000-memory.dmp

      Filesize

      64KB

    • memory/1620-59-0x00007FFE7B330000-0x00007FFE7B340000-memory.dmp

      Filesize

      64KB

    • memory/1620-58-0x00007FFE7B330000-0x00007FFE7B340000-memory.dmp

      Filesize

      64KB

    • memory/1620-62-0x00007FFEBB2B0000-0x00007FFEBB4A5000-memory.dmp

      Filesize

      2.0MB

    • memory/1620-35-0x00007FFE7B330000-0x00007FFE7B340000-memory.dmp

      Filesize

      64KB

    • memory/1620-41-0x00007FFEBB2B0000-0x00007FFEBB4A5000-memory.dmp

      Filesize

      2.0MB