Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 06:06

General

  • Target

    2024-06-25_9184eb164b73859d8b277da0135478f6_magniber.exe

  • Size

    2.1MB

  • MD5

    9184eb164b73859d8b277da0135478f6

  • SHA1

    57cb7aaa912c3c343ac59e7d4612f9c06d21a988

  • SHA256

    26ea7788c0d3833b19fa2b903e0a267edf3bf24890b2d1a7ed1f5c85098dc863

  • SHA512

    354ebc458e2decbc3bbb7896f7dcf40c019c58b6357dac5be5381bb3472558f77ac1c838b89ddec6b479d971c994e29423492588cbd12d69b41739cd73937a01

  • SSDEEP

    24576:PqRG0VduIt0h79LyQvZhJ2cTaH4Y7grQWP/fc/LFMBi4laHBW1UCY:yR3+PlJ2cTaH48k3XUjgDIMg

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-25_9184eb164b73859d8b277da0135478f6_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-25_9184eb164b73859d8b277da0135478f6_magniber.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Tencent\QQPCMgr\QQPCMgrInstall_20240625060637.Log

    Filesize

    2KB

    MD5

    35039e83e8191d562c6c0aa8f16bb973

    SHA1

    ba338b5bd5e8f3ba659496822941f208eb001085

    SHA256

    076c735ca9c60996348fb315a792b05ed71af0c84e8672928d349a4dc67a8a58

    SHA512

    72ffb35cf9205a0f40e662ae96fd7f77c13f6cb4b8859252f76f96f3ba1bc0f9ba6172ff9ce5fe384fd131d87cc40f94ba169c60fc350401df29a9d466e39a4b

  • C:\ProgramData\Tencent\QQPCMgr\QQPCMgrInstall_20240625060637.Log

    Filesize

    1KB

    MD5

    c233a5ab62fc1abcacd522dea6ad04dc

    SHA1

    4591b7aa4e002265982537e0017fccf4851b1739

    SHA256

    b5dd689a90b81d7f3d558923614001b936837c3ab5fa6837567f533341f6d677

    SHA512

    cea1655cc4078dc28e7ab968f77398ed99cf26179833ad8568785f667fd34de738bd908866629e82ffe34125cd87648fda7cebe6b55d2da444bb0257bfde7935

  • memory/1964-14-0x00000000025E0000-0x00000000025E1000-memory.dmp

    Filesize

    4KB