Analysis Overview
SHA256
3d6fc982dd43827b1e2252a00b7382608dd91b2906c10512a716a73ad8e33239
Threat Level: Shows suspicious behavior
The file 2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
Writes to the Master Boot Record (MBR)
Unsigned PE
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-04 20:35
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-04 20:35
Reported
2024-06-04 20:38
Platform
win7-20240221-en
Max time kernel
120s
Max time network
122s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe
"C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | write.52toolbox.com | udp |
| CN | 47.98.49.125:80 | write.52toolbox.com | tcp |
| CN | 47.98.49.125:80 | write.52toolbox.com | tcp |
| US | 8.8.8.8:53 | s.52toolbox.com | udp |
| CN | 139.196.165.62:80 | s.52toolbox.com | tcp |
Files
\Users\Admin\AppData\Local\Temp\netul.dll
| MD5 | 8fcd24245b2222378e01f3c121c91f19 |
| SHA1 | ccb5c8a936af48286501385c0f773190d80734fd |
| SHA256 | 42e4e927c0e918748615436affce4f7b8214b9438be15c38ae3be36cf01541f1 |
| SHA512 | 9d16b9001e2b7629b28f1941c90ac90955c8a1d2676cbe03b71746982caaa463aa30b6f4122a24492f84b9534bafd387d3bf5680dfc7a68235214c82327082f7 |
\Users\Admin\AppData\Local\Temp\{BF4B6F50-2D06-46c3-860A-EFD79EACED7A}.tmp\7z.dll
| MD5 | 5e9acabc72b82e2020626d8d72c13ac4 |
| SHA1 | 255598e95ba298834bca1fbce7e6e576e4b81e73 |
| SHA256 | de4303106ffb4e11141f72270f7e992737ed49b2993f56fb0b7f7db8ae03eeaf |
| SHA512 | 4fdafb37e16b3c5425aaa126a04ddf82d70f5bddf59ba3f6358323b8fbd0388f4236179fd3fdca4cfcacda4e5bcd27109c8d6d1d87ab0da65a19b2318639fbc9 |
memory/1956-18-0x0000000000840000-0x0000000000841000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-04 20:35
Reported
2024-06-04 20:38
Platform
win10v2004-20240508-en
Max time kernel
92s
Max time network
107s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe
"C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 99.56.20.217.in-addr.arpa | udp |
| US | 8.8.8.8:53 | write.52toolbox.com | udp |
| CN | 47.98.49.125:80 | write.52toolbox.com | tcp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| CN | 47.98.49.125:80 | write.52toolbox.com | tcp |
| US | 8.8.8.8:53 | s.52toolbox.com | udp |
| CN | 139.196.165.62:80 | s.52toolbox.com | tcp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
| US | 52.111.229.43:443 | tcp | |
| US | 8.8.8.8:53 | 249.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\netul.dll
| MD5 | 8fcd24245b2222378e01f3c121c91f19 |
| SHA1 | ccb5c8a936af48286501385c0f773190d80734fd |
| SHA256 | 42e4e927c0e918748615436affce4f7b8214b9438be15c38ae3be36cf01541f1 |
| SHA512 | 9d16b9001e2b7629b28f1941c90ac90955c8a1d2676cbe03b71746982caaa463aa30b6f4122a24492f84b9534bafd387d3bf5680dfc7a68235214c82327082f7 |
C:\Users\Admin\AppData\Local\Temp\{168C95ED-0C6D-49d2-B458-FBAF041CD4FA}.tmp\7z.dll
| MD5 | 5e9acabc72b82e2020626d8d72c13ac4 |
| SHA1 | 255598e95ba298834bca1fbce7e6e576e4b81e73 |
| SHA256 | de4303106ffb4e11141f72270f7e992737ed49b2993f56fb0b7f7db8ae03eeaf |
| SHA512 | 4fdafb37e16b3c5425aaa126a04ddf82d70f5bddf59ba3f6358323b8fbd0388f4236179fd3fdca4cfcacda4e5bcd27109c8d6d1d87ab0da65a19b2318639fbc9 |