Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 17:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe
-
Size
1.5MB
-
MD5
a925d7a9c8992986cfd7af995c67499c
-
SHA1
8b5afc36e8e8902dcf96192fd43c71fbb09d56d0
-
SHA256
3280df1694d40529d3dbed00dca7ce21dd0c1af44741294b10e1e818230dba0c
-
SHA512
4c0a826bdc1305326d2214d8928d3e4a59b269e89e9d582c4660e69dad254a868b36a7a7a6038fbaa0417ad59a061ec6e65e3f54e8d4646a1be691eefb089e5f
-
SSDEEP
49152:qWUMv5De9/yG9/ooooERQr0tb6H8RlOuQhRe4/vR:qWUMqyGB0Z6H8Rl4yW
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exedescription ioc process File opened for modification \??\PhysicalDrive0 2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe -
Modifies registry class 4 IoCs
Processes:
2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F 2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\7CCD586D-2ABC-42FF-A23B-3731F4F183D9 = "4DEC930631D6A523D3820D3CE1249367" 2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\5E1D6A55-0134-486E-A166-38C2E4919BB1 = "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAA1QEjAc/rEUmt/LBYo5AIGgQAAAACAAAAAAAQZgAAAAEAACAAAAC8ZKoiM6rZad2rubsfQ2KDwl/01WUlxgfbsng8wPuIagAAAAAOgAAAAAIAACAAAAAyAMk7+AGm9fZg4SkWUKU3CLXLmC8fZm/dnP99Ym3uKjAAAAA4sbcNVwL6ivtwSSaotNqT6BzCTEscWN4ra/ZkhMlZhLmw1AFLkJsFutN2GoD+FCNAAAAA8rJSSE0A2LLJkj4jkxyFP0wib+A8t/jceWsOdNkTJDTaF9pvIxvnp/nEUd+uiTTF0ui/W24cTnkiXPwmJnQvzA==" 2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F\56C7A9DA-4B11-406A-8B1A-EFF157C294D6 = "283988b1-9e51-49d1-8eed-a6e9fb2c555e" 2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exepid process 1632 2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-16_a925d7a9c8992986cfd7af995c67499c_magniber.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1632