Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe
-
Size
205KB
-
MD5
11f28eb54a1906f7f710067f0401c8f1
-
SHA1
a7c053fb2575408b2771a93eb8746b8e749791cf
-
SHA256
9236d6a1220e6865effbf65a081aa2e0a3bf1b70969bd52d835c6ab2de207fcc
-
SHA512
22f8c6511861acc0552b012562bcdd9ea759261c2c0863989e05f26b90f5c75e2345dba35f55a11bd13fff0d4a5816d1512fa675cae24605655963eefb1f7b22
-
SSDEEP
3072:JqEo7L4ueEp6Bxf3IbgFPJipLgaJ5R56AtCw9THbmQ6h6pxMJJgZOiUZBqZS9Y:IEaLjp6Bybjb5+AhHbmpJJy5
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe -
Deletes itself 1 IoCs
pid Process 2220 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 944 winmgr.exe 2556 winmgr.exe -
Loads dropped DLL 3 IoCs
pid Process 640 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 640 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 944 winmgr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-5050572947025827857375865240\\winmgr.exe" 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-5050572947025827857375865240\\winmgr.exe" 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1928 set thread context of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 944 set thread context of 2556 944 winmgr.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-5050572947025827857375865240\winmgr.exe 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe File opened for modification C:\Windows\M-5050572947025827857375865240\winmgr.exe 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe File opened for modification C:\Windows\M-5050572947025827857375865240 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1928 wrote to memory of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 1928 wrote to memory of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 1928 wrote to memory of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 1928 wrote to memory of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 1928 wrote to memory of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 1928 wrote to memory of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 1928 wrote to memory of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 1928 wrote to memory of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 1928 wrote to memory of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 1928 wrote to memory of 640 1928 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 28 PID 640 wrote to memory of 2220 640 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 29 PID 640 wrote to memory of 2220 640 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 29 PID 640 wrote to memory of 2220 640 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 29 PID 640 wrote to memory of 2220 640 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 29 PID 640 wrote to memory of 944 640 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 30 PID 640 wrote to memory of 944 640 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 30 PID 640 wrote to memory of 944 640 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 30 PID 640 wrote to memory of 944 640 2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe 30 PID 944 wrote to memory of 2556 944 winmgr.exe 32 PID 944 wrote to memory of 2556 944 winmgr.exe 32 PID 944 wrote to memory of 2556 944 winmgr.exe 32 PID 944 wrote to memory of 2556 944 winmgr.exe 32 PID 944 wrote to memory of 2556 944 winmgr.exe 32 PID 944 wrote to memory of 2556 944 winmgr.exe 32 PID 944 wrote to memory of 2556 944 winmgr.exe 32 PID 944 wrote to memory of 2556 944 winmgr.exe 32 PID 944 wrote to memory of 2556 944 winmgr.exe 32 PID 944 wrote to memory of 2556 944 winmgr.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-28_11f28eb54a1906f7f710067f0401c8f1_magniber.exe"2⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dssrceczqv.bat" "3⤵
- Deletes itself
PID:2220
-
-
C:\Windows\M-5050572947025827857375865240\winmgr.exeC:\Windows\M-5050572947025827857375865240\winmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\M-5050572947025827857375865240\winmgr.exeC:\Windows\M-5050572947025827857375865240\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD5f9b8c9bda01552f4cf918ae3b636a502
SHA1d14abb0a8233cf82218443abbb14a4a5e4e5ec1e
SHA2569f1f744fe32d7c7fc9978c7a1b65f6e0bc32746c9afb45634b1ee5e545d60c0e
SHA51218e1ca7581e6096817ec54f52e3f39ed1848ab484f6008292dc63c50f84570a6726239af1f2b14a1e73dda9336a3612c74d0b02c91443d21fc99faa4ec037bbc
-
Filesize
205KB
MD511f28eb54a1906f7f710067f0401c8f1
SHA1a7c053fb2575408b2771a93eb8746b8e749791cf
SHA2569236d6a1220e6865effbf65a081aa2e0a3bf1b70969bd52d835c6ab2de207fcc
SHA51222f8c6511861acc0552b012562bcdd9ea759261c2c0863989e05f26b90f5c75e2345dba35f55a11bd13fff0d4a5816d1512fa675cae24605655963eefb1f7b22