Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe
-
Size
21.6MB
-
MD5
039cdc094c260dcb7a456247dac81ee0
-
SHA1
703d48ba26a8298aab4b12bfb3b2916730554895
-
SHA256
a42a71bf2bd7a0d5711ec4da837bc79a8d2571c02ac943057392db5895c6caf4
-
SHA512
57315e4a96c104382a34c18d4f7e76b5ce828abcb5edfae4c7e1fa08fea540c4baf235295cea866d08c57e6fcb09313932fbc5ba85edb4c4141e78ee2993cd7f
-
SSDEEP
393216:8YgkRhym1POju9nwSQXqbsB5+qZa4ypIBogxm28T6IeC/fwqijjvAoCJqLkgrLy:jPRhyc9nwSKpaLpIDxm28ukqLkgrLy
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 728 2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-26_039cdc094c260dcb7a456247dac81ee0_magniber.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4000 /prefetch:81⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53025ff1a2ae2105b1b773f54f986aac4
SHA1745045948d58c77c63445470c1e6c49257fb9945
SHA2566cc02b9c44fb52fcac0ccc937ef9bdc82ded8069dec18dc5ff786dedc2732a43
SHA512aadadea943323a1cedfcf70d6073252db86dc315260fe3ed272406d21dfb470eb050bc2d9a986501111cd5c94761ed60861796f62ce815d3c9e7e5b14a1a3f40