Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 11:26

General

  • Target

    2024-05-25_1dd8c81067ba1975428def96d968080c_magniber_revil.exe

  • Size

    4.8MB

  • MD5

    1dd8c81067ba1975428def96d968080c

  • SHA1

    e6c86cd5a3ecece6fc6ad2f6dd5a8bc3e9e44d83

  • SHA256

    bff1ac9bb8b210886f4c76d7218af842412c8a90cde1c229db9aaa9d91a81a2f

  • SHA512

    ba14e7ab80d6c90dedb5efcfa9a84158c6ad429afde8557a82cff923dfabfd9353ec70e47397ee414435f43b6a0d50365861e05116eb64e132dae1487226a65b

  • SSDEEP

    98304:UPTxnEk+I2PGAbhRiCu/CVUdVEy9qMBNP/qxct8q7zTILXWBFXF3Uw:u+7k4UdVEy9qMBNLtTWa7Uw

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-25_1dd8c81067ba1975428def96d968080c_magniber_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-25_1dd8c81067ba1975428def96d968080c_magniber_revil.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\netul.dll

    Filesize

    1.9MB

    MD5

    6355fc65038e58c1ee13077955ac9e47

    SHA1

    bf5996a2f36b312443340efc14c454fe7845c689

    SHA256

    387db30cc4af3363def8374729cf79fc680f82a25ddc65186ee2941d13aa368c

    SHA512

    c83f4e81a10fc0615f245a0de9b8081430284995cbe0f134fb44258511e0b5409a7e72a10f47ab000ed98d41545b03bc68845bc6f81e8b0fd6d9cc89d2b4f124

  • \Users\Admin\AppData\Local\Temp\{AC2897CF-3A54-4c79-980A-96BB06BB3E94}.tmp\7z.dll

    Filesize

    1.1MB

    MD5

    da0654ae63ff2b4ba16a255356d07af3

    SHA1

    c5d1988e3676d4c97c672c450be841612793e57f

    SHA256

    7d37421cf4c371251225fe8aa5efdab0ddff6775cc4ecb8b4cc494777d1ea607

    SHA512

    970636caee5427bab7914f32a7cfa45076cce5369e505f97e3fd57cd1c1d6ef167dc0234ddb03fc27a917f575c4d56ef416e377bd05727b61e6efa2ceaca794c

  • memory/2784-19-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB