Analysis
-
max time kernel
0s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe
-
Size
4.1MB
-
MD5
f3ff1cdcd228e8eefcbb3a6e2e2a6bb9
-
SHA1
54ad06c64ff54225acc6ee370f04eeffb932068f
-
SHA256
794a9028b23fdcf7fc07b0c7128752f4df8aa834a9ee1590e5a44d250c19fe4c
-
SHA512
f102b21dbd635d88256f5c6027591a465de476f0ace34a43e5d39d7157d18c91ad39a7d47dccd12e41cc94595a0d85d305fb1613748b066a7754427e19bb3e1f
-
SSDEEP
98304:jNCaWIgYT2SoDD+T+wgqUQeknTkKqcqV8M8:jN5Wwo+T+wRUjVsO8M8
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe -
Modifies registry class 1 IoCs
Processes:
2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{210928FE-DDF5-01E8-4F49-451192D28BC3} 2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe