Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe
-
Size
251KB
-
MD5
7555658294636c965d58a43e02c14888
-
SHA1
811aae2ad4be0ea6a96b026980bca9e201bc05ff
-
SHA256
f1bcdd2b108a85ffa57f4b99e4e605a2f18b320ce3e275ae95bde5994895ab34
-
SHA512
cec4eb9817b554dc06469ce6675c80be846876ecc38d85b8106c940f9b287faab58390b71f3ad27e4f205e0950e1bb7ea78d3af145ee1446fbfafd586f28b145
-
SSDEEP
3072:ZZAxFmJZHBdf848pHO8yp26vE4qZGV6R2fBkjLSzuxZ2pv+oH7FsOFFOA5gfxR7b:ALmXBdf8Vu5dHV30Z2pGo5sOFECgfxpD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe -
Executes dropped EXE 2 IoCs
pid Process 3288 winmgr.exe 1592 winmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50507627057205928477583929470\\winmgr.exe" 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50507627057205928477583929470\\winmgr.exe" 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 996 set thread context of 1468 996 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 86 PID 3288 set thread context of 1592 3288 winmgr.exe 93 -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.ZipFile.dll winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe winmgr.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-50507627057205928477583929470\winmgr.exe 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe File opened for modification C:\Windows\M-50507627057205928477583929470\winmgr.exe 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe File opened for modification C:\Windows\M-50507627057205928477583929470 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 996 wrote to memory of 1468 996 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 86 PID 996 wrote to memory of 1468 996 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 86 PID 996 wrote to memory of 1468 996 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 86 PID 996 wrote to memory of 1468 996 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 86 PID 996 wrote to memory of 1468 996 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 86 PID 996 wrote to memory of 1468 996 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 86 PID 996 wrote to memory of 1468 996 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 86 PID 996 wrote to memory of 1468 996 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 86 PID 996 wrote to memory of 1468 996 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 86 PID 1468 wrote to memory of 3648 1468 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 87 PID 1468 wrote to memory of 3648 1468 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 87 PID 1468 wrote to memory of 3648 1468 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 87 PID 1468 wrote to memory of 3288 1468 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 88 PID 1468 wrote to memory of 3288 1468 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 88 PID 1468 wrote to memory of 3288 1468 2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe 88 PID 3288 wrote to memory of 1592 3288 winmgr.exe 93 PID 3288 wrote to memory of 1592 3288 winmgr.exe 93 PID 3288 wrote to memory of 1592 3288 winmgr.exe 93 PID 3288 wrote to memory of 1592 3288 winmgr.exe 93 PID 3288 wrote to memory of 1592 3288 winmgr.exe 93 PID 3288 wrote to memory of 1592 3288 winmgr.exe 93 PID 3288 wrote to memory of 1592 3288 winmgr.exe 93 PID 3288 wrote to memory of 1592 3288 winmgr.exe 93 PID 3288 wrote to memory of 1592 3288 winmgr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-07_7555658294636c965d58a43e02c14888_magniber.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ostzfrrjqu.bat" "3⤵PID:3648
-
-
C:\Windows\M-50507627057205928477583929470\winmgr.exeC:\Windows\M-50507627057205928477583929470\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\M-50507627057205928477583929470\winmgr.exeC:\Windows\M-50507627057205928477583929470\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1592
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD550cce3e9691a4f26c4854a41982fee7f
SHA1cd0db71ed17e5c61028239609d5bfa3f9d97c8b5
SHA2563b81c1a85f4a56eaf41d4929d6584dea4569114775c4c1f2fbd0e3d4c2ebd18f
SHA5122896c5234e0a0b212bd112141baacc47ef43d1eff72a312ed095cf33e76c5aec1688ee7b2a8e146eb299623b9ffeacbfc67bae3faaeab34e1fcf895804449208
-
Filesize
252KB
MD5260e64f10b8374dc40a931b89d2f2e37
SHA15669ccb214e74a8a1510328a4fd11d4a9f9a9eb2
SHA25675b3e4405e1a5cf48b187b1fdc444940a377613efc9ff4fea620b005e5bccab0
SHA5128bb974e060a183136e9b8b22fc1c78784bc366a9636beb1c502b02fd54b507acae14c716418c2dcafcdbb1ebfe80418c6a7327a6871b75666e3579d917e3bbd3
-
Filesize
251KB
MD57555658294636c965d58a43e02c14888
SHA1811aae2ad4be0ea6a96b026980bca9e201bc05ff
SHA256f1bcdd2b108a85ffa57f4b99e4e605a2f18b320ce3e275ae95bde5994895ab34
SHA512cec4eb9817b554dc06469ce6675c80be846876ecc38d85b8106c940f9b287faab58390b71f3ad27e4f205e0950e1bb7ea78d3af145ee1446fbfafd586f28b145