Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe
-
Size
1.6MB
-
MD5
ae32d366ad86f99e835acd3df6d1461f
-
SHA1
611723159c451cf3ea51ea48d25554c0447c3771
-
SHA256
386259862c77062a84fb58d2926fd4231320bc843b44f66137f675b87cb75608
-
SHA512
c93dc6813b3d4c9b92efc5515faf086e368b3978cb3c6b795a305935251167791f65e813b00340efb4e6d85f38bd33182318acce2edd270c5005308727fd5f5c
-
SSDEEP
49152:xRDcOmqU66IdwbhIOfTCAIpHv6TDxypBjHe:xRDcOmqUniyxh
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AB5FB267-2B7F-75F4-3488-6B4DE46FC2DE} 2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AB5FB267-2B7F-75F4-3488-6B4DE46FC2DE}\ = "OutlookAttachMoniker" 2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AB5FB267-2B7F-75F4-3488-6B4DE46FC2DE}\InprocServer32 2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AB5FB267-2B7F-75F4-3488-6B4DE46FC2DE}\InprocServer32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\OUTLRPC.DLL" 2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AB5FB267-2B7F-75F4-3488-6B4DE46FC2DE}\InprocServer32\ThreadingModel = "Apartment" 2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3016 2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe Token: SeIncBasePriorityPrivilege 3016 2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_ae32d366ad86f99e835acd3df6d1461f_magniber.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3016