Analysis

  • max time kernel
    159s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 04:50

General

  • Target

    2024-05-09_7bde7e7db7a164071a0eb435f463fe1a_magniber.exe

  • Size

    8.6MB

  • MD5

    7bde7e7db7a164071a0eb435f463fe1a

  • SHA1

    85f0d4b62868a3ea30d3e426f6f3bf805a455fcc

  • SHA256

    12b67d235de5bfd0c1f958229210743af02e19e09a6df9f52fb5e178602856c7

  • SHA512

    e192b6d842eabfacd91279a5781632003fa6e7807c9b054a596499e178366388de9e24d7694b94c17a3e264673ad5991173c209c2a1be7ba11abef1567c571dd

  • SSDEEP

    98304:37cMZuyxXKNgR7YjTMbk+ust6tXHJwWkHmPh7gCNq7N2/wK0pmsCWrqufezvk/sz:ogK+lYMIstaiOgC8KVWrqufezvP

Score
6/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-09_7bde7e7db7a164071a0eb435f463fe1a_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-09_7bde7e7db7a164071a0eb435f463fe1a_magniber.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4984
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2196
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3248

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501

      Filesize

      1KB

      MD5

      e3518d7ef0f909aecbc1948462216b69

      SHA1

      4e1b64f253aa7596022fc0bbb1543da9d77a681f

      SHA256

      e1f1c2397b7082ba26243a42b6ed54847f2257ce9470a8d319690d8edfbf6838

      SHA512

      e3fb8bd4229887972d308665f5d038dd78027406290beaf58eb53d22b7c23f3f1a398dbf643290569cbcfab045acef591c2dcb07cf5f7119d5dfdef80008d5a3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\769F85394FB15C375FF89A7488274D5B_22252D7CC6CD0EA80FCE3FF30A53AFB2

      Filesize

      1KB

      MD5

      9b37de7feb7cced2dbd7943247af84ff

      SHA1

      9f322014df78a0fd23a63d068d517b18a363dac7

      SHA256

      d51b93dc53d749e9ccf8262ae76c04a0b2edba8d5a9d07a6e17dc265ac457f7a

      SHA512

      de61bbf832837cb3af15980ff812e862b91cc3c012b4b92b84c4072277f5074b3f79732ad86b0f4643708c7503054e8c892a2c8699a1fd797681c652c3359977

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_4BB72A60CF9C652B353353202101C0E4

      Filesize

      1KB

      MD5

      ccd2edb9813db029375b704238f737ed

      SHA1

      cbb089193ccacf5a56a03486ae4ff91eb4cf80e5

      SHA256

      c3e47535225664555cfbaa115f50a5b85503bf7a852181087811dc4e8cf48993

      SHA512

      55ad01c141d8684d78b1ceb11ad69f4abaf413653ddf19cca2f7ab25c973359bde7a1612dfcecd8feb790b1a9672373f6515883e17d4cfc3178e2f522800b996

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B0B1E3C3B1330A269DBEE4BA6313E7B4

      Filesize

      1KB

      MD5

      2ffbdb98df2a2b022a48adeb94a3af50

      SHA1

      6c86923b5c5832bb102f041cb7d38db397074f12

      SHA256

      dd12c5733bc4b682e1da6353c8c27650f53d11a8ada8fd8a2d06f23cecae5ebd

      SHA512

      a5f29661ac78ea205dd945fcc53e015152277426af4bcce688231ca1a564dc49144b2953409651737733fec72e9042468c780917543c007d7de74ed44058dbfb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0

      Filesize

      5B

      MD5

      5bfa51f3a417b98e7443eca90fc94703

      SHA1

      8c015d80b8a23f780bdd215dc842b0f5551f63bd

      SHA256

      bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

      SHA512

      4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_A026C9CD7BA14377D055F4A2325D4501

      Filesize

      508B

      MD5

      6f28c29738e2c41976c0a6f1bfc13cba

      SHA1

      97a28d6f68a39cc15a49eb4832624a9bedacf8be

      SHA256

      c46d819fbc69bdf579fd3f10263c340e7b2421ef2b3ee0f81dbcd149163cc221

      SHA512

      d70c39b400cc41f2dccfff219c84eec222f5e1220002943430427ce3f0f0edf00a74816d1a69d9b51f0c2de88b280c76317c96b61ecf415e7792dc89474993e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\769F85394FB15C375FF89A7488274D5B_22252D7CC6CD0EA80FCE3FF30A53AFB2

      Filesize

      522B

      MD5

      7739a1c34352c49fbd4b3370b8e5ecbd

      SHA1

      1b28727e7e7c58179651a565096fd3670a7f3192

      SHA256

      ff003e31ce293e9ab3615fbe071ca22cfd8e396d81340e71b21928f6badfd4e2

      SHA512

      1b308750763327b08d660782279bcc8e01e696c677b10beb4d25c93b5fd05a816eb4e675c3580d5b7af299e7e41f41bd2a543abd5069153b54a85f3728c66c1c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_4BB72A60CF9C652B353353202101C0E4

      Filesize

      502B

      MD5

      2e825b3b3f48860dde1c6471bd0d9fae

      SHA1

      8400a45153c4a2dcdd0e018e408aa8484da99d99

      SHA256

      07352c69b0ce90fa81fdc14225b39c1cc9987854fa166d1a12c4243e96894df8

      SHA512

      08b097b620ef810aa0d1ec9badfeca30dfb9f727508586df763acf9f7b3b63bcf7cd6136460112f862a00d5290833b09bca8a46328b37636c5ce61c24a4a6ca0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B0B1E3C3B1330A269DBEE4BA6313E7B4

      Filesize

      208B

      MD5

      ecab2813bcb9ecaea7e6b1f790b3fa3a

      SHA1

      d3151bf39d41d807b0d47229a71414de746166d0

      SHA256

      d1ae6029bd408ad1d193f4cf5cc2236cdc8987b440acae0e7105bdfc3d253a46

      SHA512

      f6e53d4172a58e3c11ddadec5ed440c8d4e65159942300f94d6f11fb9bd9ff05c3d9fe964805eb5df8a22a51a4dc2b6f8dba564e9de4e32d4757c241e39cdb1f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDA81A73291E20E6ACF6CACA76D5C942_4EA93225B46C4B45501FF0DDE9E306D0

      Filesize

      440B

      MD5

      62a5f8940f1cb5b8dc1f9d43d8b53550

      SHA1

      3b444a4df1b60ff5e81b5512069c752c7d8a3536

      SHA256

      a18ceba645ebdda6035e965138af3b699647c1303d7af7a703fa8a5469110d37

      SHA512

      dd80343151a01968d7acc2d186ac3ed0e9c77d5ff17ded09f281e4260c0874f0e3490693041c4576836ff01e9e31b32b47b5dc6fbcaf72ef577a873827fedefc

    • C:\Users\Admin\AppData\Local\Temp\YandexSearch00000.log

      Filesize

      35KB

      MD5

      c098def3299348122a6ba8d6d72483e4

      SHA1

      718f5ca777ffab68aaa4985d4e3a64d8397a9bd6

      SHA256

      59114835d79e2771455d989ab4f38bbf9a3116f88a3c92f5308abdc876989ac5

      SHA512

      e14a7270b51772a33f8183a9218ba73d851d0ff17ad1d9c1f67ab4a054c37a05a69f68b44acba045ac8cc76ac41fffaf2a23426d54ce63bf9a4a42c0cd3ec9d9

    • C:\Users\Admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msi

      Filesize

      8.3MB

      MD5

      61487350b4226df24c23621a49daeb7b

      SHA1

      38600663e835772dec524a4ee977a5e1170b1be2

      SHA256

      a5151614ed9a058615b1fc155694c608193dd7d55b106ec639b6f4d4a9658038

      SHA512

      e5a3872e19a021be66355f591ddef6985633940b32c5718896f60cfb128d7603cf2cb7e2d864323008cb8ce71e212307108d3be9304b20cace60940231966387

    • C:\Users\Admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msi

      Filesize

      1.9MB

      MD5

      3e608d101fae0272ee65fe4cc17a6c7c

      SHA1

      35bb0c1568185d575059bddb31c776e8aeb46829

      SHA256

      cba8c8830134e12a95020d3e22402073da9fc0e7873510dfbcdabd896259ca97

      SHA512

      c05388306678068d571f388ce91954be4b59c93fb30bfd1c89c1ab2994765d9aec2f6450cea163254203420ff104a7f1c8dc919a765e3d10ee3276aefba9cd79