Analysis

  • max time kernel
    0s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2024 01:44

General

  • Target

    2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe

  • Size

    4.1MB

  • MD5

    f3ff1cdcd228e8eefcbb3a6e2e2a6bb9

  • SHA1

    54ad06c64ff54225acc6ee370f04eeffb932068f

  • SHA256

    794a9028b23fdcf7fc07b0c7128752f4df8aa834a9ee1590e5a44d250c19fe4c

  • SHA512

    f102b21dbd635d88256f5c6027591a465de476f0ace34a43e5d39d7157d18c91ad39a7d47dccd12e41cc94595a0d85d305fb1613748b066a7754427e19bb3e1f

  • SSDEEP

    98304:jNCaWIgYT2SoDD+T+wgqUQeknTkKqcqV8M8:jN5Wwo+T+wRUjVsO8M8

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2172-0-0x0000000002A80000-0x0000000002BF2000-memory.dmp

    Filesize

    1.4MB

  • memory/2172-7-0x0000000002A80000-0x0000000002BF2000-memory.dmp

    Filesize

    1.4MB

  • memory/2172-6-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/2172-13-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/2172-18-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/2172-17-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/2172-19-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/2172-23-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2172-20-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/2172-21-0x0000000002A80000-0x0000000002BF2000-memory.dmp

    Filesize

    1.4MB

  • memory/2172-16-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/2172-14-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/2172-12-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/2172-25-0x0000000002A80000-0x0000000002BF2000-memory.dmp

    Filesize

    1.4MB

  • memory/2172-26-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/2172-29-0x0000000002A80000-0x0000000002BF2000-memory.dmp

    Filesize

    1.4MB

  • memory/2172-30-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB