Analysis

  • max time kernel
    0s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2024 01:44

General

  • Target

    2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe

  • Size

    4.1MB

  • MD5

    f3ff1cdcd228e8eefcbb3a6e2e2a6bb9

  • SHA1

    54ad06c64ff54225acc6ee370f04eeffb932068f

  • SHA256

    794a9028b23fdcf7fc07b0c7128752f4df8aa834a9ee1590e5a44d250c19fe4c

  • SHA512

    f102b21dbd635d88256f5c6027591a465de476f0ace34a43e5d39d7157d18c91ad39a7d47dccd12e41cc94595a0d85d305fb1613748b066a7754427e19bb3e1f

  • SSDEEP

    98304:jNCaWIgYT2SoDD+T+wgqUQeknTkKqcqV8M8:jN5Wwo+T+wRUjVsO8M8

Malware Config

Signatures

  • Banload

    Banload variants download malicious files, then install and execute the files.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-07_f3ff1cdcd228e8eefcbb3a6e2e2a6bb9_magniber.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    PID:4352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4352-8-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/4352-9-0x0000000002EA0000-0x0000000003012000-memory.dmp

    Filesize

    1.4MB

  • memory/4352-1-0x0000000002EA0000-0x0000000003012000-memory.dmp

    Filesize

    1.4MB

  • memory/4352-16-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/4352-19-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/4352-20-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/4352-22-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/4352-23-0x0000000002EA0000-0x0000000003012000-memory.dmp

    Filesize

    1.4MB

  • memory/4352-21-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/4352-15-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/4352-18-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/4352-14-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/4352-25-0x0000000002EA0000-0x0000000003012000-memory.dmp

    Filesize

    1.4MB

  • memory/4352-26-0x0000000002EA0000-0x0000000003012000-memory.dmp

    Filesize

    1.4MB

  • memory/4352-27-0x0000000000400000-0x0000000000D2A000-memory.dmp

    Filesize

    9.2MB

  • memory/4352-30-0x0000000002EA0000-0x0000000003012000-memory.dmp

    Filesize

    1.4MB