Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 12:01
Behavioral task
behavioral1
Sample
2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe
Resource
win7-20240508-en
General
-
Target
2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe
-
Size
5.1MB
-
MD5
571c4af4cedef9b6d90dd0c125dc15ae
-
SHA1
9b93f2f375c70d7f65453a6c2a19ff02642b01e9
-
SHA256
7109dad9bf6b84cd5f7726c0da2b14d874c406ba7b61615269e8c0c8d0993814
-
SHA512
b96bd93d05d45e20665513ac8fe90f3a8eff2a1e9c350dd869b0c8fca99f0ba38e935db97f198f2bdf31dc9d8a7aab8147f48175bf785f3659f621e8e4a53a7c
-
SSDEEP
98304:RQvO/XAnnXrv9qCUI48Kbnk48LRYJ5wk4r3z:R76nXrv9qCUI48W3O
Malware Config
Signatures
-
Detects JavaScript files used for persistence and executable or script execution 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\HYD4C7A.tmp.1715428876\HTA\scripts\common.js INDICATOR_SUSPICIOUS_JS_LocalPersistence -
UPX dump on OEP (original entry point) 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1416-0-0x0000000000400000-0x0000000000921000-memory.dmp UPX behavioral2/memory/1416-86-0x0000000000400000-0x0000000000921000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exedescription ioc process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Wine 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe -
Processes:
resource yara_rule behavioral2/memory/1416-0-0x0000000000400000-0x0000000000921000-memory.dmp upx behavioral2/memory/1416-86-0x0000000000400000-0x0000000000921000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2808 4832 WerFault.exe mshta.exe -
Modifies registry class 2 IoCs
Processes:
2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\FalconBetaAccount 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\FalconBetaAccount\remote_access_client_id = "6712150301" 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exepid process 1416 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe 1416 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exedescription pid process Token: SeManageVolumePrivilege 1416 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exedescription pid process target process PID 1416 wrote to memory of 4832 1416 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe mshta.exe PID 1416 wrote to memory of 4832 1416 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe mshta.exe PID 1416 wrote to memory of 4832 1416 2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe"1⤵
- Checks computer location settings
- Identifies Wine through registry keys
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\HYD4C7A.tmp.1715428876\HTA\index.hta?utorrent" "C:\Users\Admin\AppData\Local\Temp\2024-05-11_571c4af4cedef9b6d90dd0c125dc15ae_magniber_zxxz.exe" /LOG "C:\Users\Admin\AppData\Local\Temp\HYD4C7A.tmp.1715428876\index.hta.log" /PID "1416" /CID "woZ5UsYByFQm8IQZ" /VERSION "109946050" /BUCKET "0" /SSB "2" /COUNTRY "US" /OS "10.0" /BROWSERS "\"C:\Program Files\Mozilla Firefox\firefox.exe\",\"C:\Program Files\Google\Chrome\Application\chrome.exe\",C:\Program Files\Internet Explorer\iexplore.exe,\"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe\"" /ARCHITECTURE "64" /LANG "en" /USERNAME "Admin" /SID "S-1-5-21-1337824034-2731376981-3755436523-1000" /CLIENT "utorrent"2⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 14203⤵
- Program crash
PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4832 -ip 48321⤵PID:1260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HYD4C7A.tmp.1715428876\HTA\images\main_utorrent.icoFilesize
104KB
MD544d122c9473107fc36412de81418c84a
SHA1a0072c789a9cd50ba561683c69af8602927cf4a8
SHA2567c7279daebd88f6a34246603db9c0ecf9bbfa35ef820edd3278e5bc53f9e7680
SHA512b4294b80edc0566744dd98a5ab3e2ac64a4ce4851192d5610ee13f12dc24947f51b7d5b5629f7bff6004d74e5a2b728913cda1b3386cf878ab7fb365490d8067
-
C:\Users\Admin\AppData\Local\Temp\HYD4C7A.tmp.1715428876\HTA\index.htaFilesize
522B
MD576903930c0ade2285f1ab1bf54be660d
SHA10fdd5990ca58cf6c49985ffd2075baa09cd728ce
SHA25661acd6e7405fad348433f8de4b12ed97b42caccbcf28fe0e4ba4b4a5d2ea707e
SHA512c66c7f9f488a0ac58fc1b7c6560edb4bc6df71a3504c2567ac54f4f89aee40a7073865e67e508baf4e055555bbc2f461d5b558a427ab6ac602b9fe0b1f9f8c71
-
C:\Users\Admin\AppData\Local\Temp\HYD4C7A.tmp.1715428876\HTA\install.1715428876.zipFilesize
761KB
MD5a65ca84bf2c878f87206ff596142b062
SHA18998ef455e40d8d1d0d903369ac832a7afd7fc1e
SHA25668e37eed2e04830fce9f735d8a2ecebb19a651394f5d590581370ac5d7754d90
SHA512bb87190b55a2192b0c3dfaecc26b5e144ffc021fe45e70baf48788ea687511cf53b5851d79b95b85841257293271e2eaab3cdc0ff0bea401127d9172e5d75ae2
-
C:\Users\Admin\AppData\Local\Temp\HYD4C7A.tmp.1715428876\HTA\scripts\common.jsFilesize
354KB
MD5294704ab62d0810ce15a39d08c8b1bf4
SHA19eb74fbb3eb81e6312c94ec4e3e84792e1a0aa68
SHA256f6332951011366de16da034680ca2eaf06d28171aa094ed42af649823b045bdd
SHA512a622b8109a5b09961dd18761abeb701b3a2956967a8373e1ea3e4648a5a0d7427f37b7d0f0e3635aad452f43d0754d30ddeeac5def88a554ad655f174d60faff
-
C:\Users\Admin\AppData\Local\Temp\HYD4C7A.tmp.1715428876\HTA\scripts\initialize.jsFilesize
1005B
MD52a65c76b51a2c15eebeefa662d511af9
SHA13c5f93d39fdd573e43c7a451836d425bc1b07a5d
SHA25631fc706ae4bd5093aecb6a0b7f9d3b686feb284076b1122aaff978779612dc06
SHA51285b012dca5bbdbdd929de859ae41ed817c7f1e02eae70aaaf687f9ba381f696fa7751e3f2262d48c14f49c9090f106a6bb9652962d38bb7fab93214a2466e8ed
-
C:\Users\Admin\AppData\Local\Temp\HYD4C7A.tmp.1715428876\HTA\scripts\install.jsFilesize
6KB
MD5ade3e833add95bf0f5f1619bf816d893
SHA148df3ae9a43c6d8783dab68ec423a9ff8ab25c04
SHA256bbbf5859eb80eda10d42aee0557256d161768f1db7648f65a12444fc40fb8f1d
SHA5128ed6005f9801ad5e7108ca698f65f7e31ecd842ca3fc9c1086f9cd247896b2ed59c8d5aaf62ad33e96e67837757814510ce058b5ce1cbdec461453799f9abf26
-
C:\Users\Admin\AppData\Local\Temp\HYD4C7A.tmp.1715428876\HTA\styles\common.cssFilesize
99KB
MD58a94d780401556cceabf35058bbd4b5a
SHA119ee91b1629f4ccf0fca1f664405a1eee9dacc5a
SHA256086a7e44de35a235bc258bf1107e22a7dc27932cb4d7e3ebcd1f368acc000caa
SHA512b02fdc9b46f6fa8424660f462bb290c60c0635ad5cb9fa1b386a55d85d4368d06ae5611d355f8dc0db76477c2e332b0501e70cbbba77c45aa027e1cac59ca182
-
C:\Users\Admin\AppData\Roaming\uTorrent\settings.dat.oldFilesize
7KB
MD5cff1979de4367b371d57feca3efdbcf6
SHA14d4e58cb25c8f9e7915ace61efac3d878edbdaed
SHA2563b45e835d6865d17d5d17891fd9c428291c309e61652fd3aa12a5f3bf641e88a
SHA512b17a42bd93b02521765580ad5cca038ee75515db621c448f119055c6ab8af802eb6058660b92a661fd47ad8fd3d87f454418de96674c730699617a4e52a832f8
-
C:\Users\Admin\AppData\Roaming\uTorrent\toolbar.benc.newFilesize
170B
MD5935e5782c51bf8ba9191f70dbd01c5bf
SHA1e1007b639ca90b3969cc00c2fd36fcc1a8056d2f
SHA256af02c7dc1b666580ba7cb28e68ef8f7c394a9caa3542c8b49278eb12f7f13f3b
SHA51225222b24ec8acab859b2173be42330dfe8da54c94dcc3d98298a63c17de5f952dba05aff8c9105930d737f535a93ce52e0f6e46df70ad495836522842bc27a1f
-
memory/1416-0-0x0000000000400000-0x0000000000921000-memory.dmpFilesize
5.1MB
-
memory/1416-86-0x0000000000400000-0x0000000000921000-memory.dmpFilesize
5.1MB