Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe
-
Size
10.8MB
-
MD5
a5d5a340ef8de6de9b80215760b41c4a
-
SHA1
f5852242e36b77411b2e4ec2abc217e227aab8d0
-
SHA256
bfb9958f3c7c065b09be3ffe9342dd8c21fad6bf5449e146c5ae6344589d1ad7
-
SHA512
6396e32b6160f45b958fc6764263e3c1416869654bff039bafd70885b5f76dd366ab149ca7b50340b030f85596498785c509d116ad5ad2c9f3a94f7dbbb68446
-
SSDEEP
196608:XXPnm1VRaeik6td8/0/tTnqaiybbfJlJ8eZhhKMcrskYcWjeayxPaD:Pm1L96td8/0fzJbvKMcryf1yI
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32} 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\Instance\InitPropertyBag 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\Instance\InitPropertyBag\Attributes = "17" 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\ShellFolder\Attributes = "4034920525" 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\ = "OneDrive" 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\InProcServer32 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\InProcServer32\ = "%systemroot%\\SysWow64\\shell32.dll" 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\Instance 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\Instance\CLSID = "{0E5AAE11-A475-4c5b-AB00-C66DE400274E}" 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\Instance\InitPropertyBag\TargetKnownFolder = "{a52bba46-e9e1-435f-b3d9-28daa648c0f6}" 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\ShellFolder 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\ShellFolder\FolderValueFlags = "40" 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\System.IsPinnedToNameSpaceTree = "1" 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\DefaultIcon 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\SortOrderIndex = "66" 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3DD6FF0E-6F2D-8498-6E1B-04B7D5BF5D32}\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe,0" 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 640 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Token: SeIncBasePriorityPrivilege 640 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Token: 33 640 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Token: SeIncBasePriorityPrivilege 640 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe Token: SeIncBasePriorityPrivilege 640 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 640 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 704 wrote to memory of 640 704 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe 85 PID 704 wrote to memory of 640 704 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe 85 PID 704 wrote to memory of 640 704 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe 85 PID 704 wrote to memory of 640 704 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe 85 PID 704 wrote to memory of 640 704 2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-10_a5d5a340ef8de6de9b80215760b41c4a_magniber.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:640
-