Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 06:31

General

  • Target

    2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe

  • Size

    205KB

  • MD5

    11f28eb54a1906f7f710067f0401c8f1

  • SHA1

    a7c053fb2575408b2771a93eb8746b8e749791cf

  • SHA256

    9236d6a1220e6865effbf65a081aa2e0a3bf1b70969bd52d835c6ab2de207fcc

  • SHA512

    22f8c6511861acc0552b012562bcdd9ea759261c2c0863989e05f26b90f5c75e2345dba35f55a11bd13fff0d4a5816d1512fa675cae24605655963eefb1f7b22

  • SSDEEP

    3072:JqEo7L4ueEp6Bxf3IbgFPJipLgaJ5R56AtCw9THbmQ6h6pxMJJgZOiUZBqZS9Y:IEaLjp6Bybjb5+AhHbmpJJy5

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe"
      2⤵
      • Modifies security service
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\dssrceczqv.bat" "
        3⤵
        • Deletes itself
        PID:2220
      • C:\Windows\M-5050572947025827857375865240\winmgr.exe
        C:\Windows\M-5050572947025827857375865240\winmgr.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Windows\M-5050572947025827857375865240\winmgr.exe
          C:\Windows\M-5050572947025827857375865240\winmgr.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          PID:2556

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\dssrceczqv.bat

          Filesize

          278B

          MD5

          f9b8c9bda01552f4cf918ae3b636a502

          SHA1

          d14abb0a8233cf82218443abbb14a4a5e4e5ec1e

          SHA256

          9f1f744fe32d7c7fc9978c7a1b65f6e0bc32746c9afb45634b1ee5e545d60c0e

          SHA512

          18e1ca7581e6096817ec54f52e3f39ed1848ab484f6008292dc63c50f84570a6726239af1f2b14a1e73dda9336a3612c74d0b02c91443d21fc99faa4ec037bbc

        • \Windows\M-5050572947025827857375865240\winmgr.exe

          Filesize

          205KB

          MD5

          11f28eb54a1906f7f710067f0401c8f1

          SHA1

          a7c053fb2575408b2771a93eb8746b8e749791cf

          SHA256

          9236d6a1220e6865effbf65a081aa2e0a3bf1b70969bd52d835c6ab2de207fcc

          SHA512

          22f8c6511861acc0552b012562bcdd9ea759261c2c0863989e05f26b90f5c75e2345dba35f55a11bd13fff0d4a5816d1512fa675cae24605655963eefb1f7b22

        • memory/640-6-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/640-7-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/640-4-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/640-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/944-35-0x0000000000527000-0x0000000000533000-memory.dmp

          Filesize

          48KB

        • memory/1928-1-0x00000000002B0000-0x00000000003B0000-memory.dmp

          Filesize

          1024KB

        • memory/2556-39-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2556-44-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2556-46-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2556-49-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2556-52-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2556-54-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2556-63-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB