Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 07:57

General

  • Target

    2024-06-25_dd9169efb3151f981d3bd08d9e26b850_magniber.exe

  • Size

    13.3MB

  • MD5

    dd9169efb3151f981d3bd08d9e26b850

  • SHA1

    68d37954bbd8a40ea74a29c18f78987d72cf59f3

  • SHA256

    4fe5d29d3326ee5cdcb9b2d68bd7a20b2fc16fae1326219b035e0a028dd5e43a

  • SHA512

    e28cbfd9ab723a98999833b4b8cf7aec627441688a79c2109d2f21e62747cd2cbb3c06cbf88d56b7d21cf82cde755e3ddf390188ead660da17f620f9e8cb2fd4

  • SSDEEP

    196608:tj8Z+xSz5s+izu/9oZxKbBIqUIAtmZWS6Ri4SGTtVap0tFHDsMRtiX49sdNVayqi:Eizu/MxK+y697TtoCtFjsYioWdN8Hc/

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 16 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-25_dd9169efb3151f981d3bd08d9e26b850_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-25_dd9169efb3151f981d3bd08d9e26b850_magniber.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4528
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 48B1FC2BC20F76F412E9C2CDA46A013A
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Users\Admin\AppData\Local\Temp\F04AECEF-705A-4C31-896C-FE11B861D452\lite_installer.exe
        "C:\Users\Admin\AppData\Local\Temp\F04AECEF-705A-4C31-896C-FE11B861D452\lite_installer.exe" --use-user-default-locale --silent --cumtom-welcome-page=https://browser.yandex.ru/promo/welcome_com/
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3056
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 94EF9A980107231047E1E707C851C571 E Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Users\Admin\AppData\Local\Temp\C1D37187-4EF6-4CF7-836E-D4478BCAC4E0\seederexe.exe
        "C:\Users\Admin\AppData\Local\Temp\C1D37187-4EF6-4CF7-836E-D4478BCAC4E0\seederexe.exe" "--yqs=" "--yhp=" "--ilight=" "--locale=us" "--browser=" "--browser_default=" "--yabm=" "--loglevel=trace" "--ess=" "--clids=C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml" "--sender=C:\Users\Admin\AppData\Local\Temp\21F1D3F5-3773-492E-9B2D-844BA2954D7F\sender.exe" "--is_elevated=yes" "--ui_level=5"
        3⤵
        • Executes dropped EXE
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Users\Admin\AppData\Local\Temp\21F1D3F5-3773-492E-9B2D-844BA2954D7F\sender.exe
          C:\Users\Admin\AppData\Local\Temp\21F1D3F5-3773-492E-9B2D-844BA2954D7F\sender.exe --send "/status.xml?clid=2270422&uuid=8a2ce437-c8d5-455d-90f3-899540d7f36d&vnt=Windows 10x64&file-no=8%0A25%0A37%0A38%0A45%0A57%0A59%0A102%0A106%0A108%0A111%0A129%0A"
          4⤵
          • Drops file in System32 directory
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e57b7f7.rbs

    Filesize

    591B

    MD5

    f9f6be577fdd18484b176a3b0ffeb3ca

    SHA1

    9c6992ccf1b067c3eb942682c1900ad9f1341977

    SHA256

    f9e81df6f248cdb38675faf6943ab0f6870794aa12c760d237451b312a655533

    SHA512

    eac429714136f1c91a98299c37e8ff795fe3d608af5a84b590ff464086a6c9589aab8ccf172dcea9ae2cd3c90d91fb70e8a8f6dd0905de3d8c2713142fb47694

  • C:\Users\Admin\AppData\Local\Temp\21F1D3F5-3773-492E-9B2D-844BA2954D7F\sender.exe

    Filesize

    249KB

    MD5

    b4e54c83c9ea7887a500bb212910fa60

    SHA1

    b18b8f384c3025234987a074f30f8792fbec1122

    SHA256

    fe3150caf8934ac028ee28f0d09bb60f638295d3c2805fa1259ddc0eb191fade

    SHA512

    47cbb9ace6a6a4adf07b80e7eb1863a8313eb0b2935999645c5769d53f93fb61b329cb1ec6df2252e5e075cd5b30dfff24697b28b5a712d4e2a1039bc04dc9d8

  • C:\Users\Admin\AppData\Local\Temp\C1D37187-4EF6-4CF7-836E-D4478BCAC4E0\seederexe.exe

    Filesize

    11.3MB

    MD5

    7da57e0c1b3cef6f521bfe659a7b6ede

    SHA1

    e12eb4c3a8f500abe131d6afe3c73b8720d79cd7

    SHA256

    f423c5cda6feabbc4f5dbb124de8d91db20026d2d60bfc9a9b3c9b28566ee412

    SHA512

    1b05639192e82dc5f7fd397765dc427a6c8e4a9e5c1ca39d951b1ada77f418713423611104a08f635eb43b8abcefac879542b6cc47ec05b0872c4be9d5bfd946

  • C:\Users\Admin\AppData\Local\Temp\F04AECEF-705A-4C31-896C-FE11B861D452\lite_installer.exe

    Filesize

    390KB

    MD5

    b3d8e7db7f90785a9050adba3a0f60aa

    SHA1

    4311153a465e7e759365004299486f1f61b7263c

    SHA256

    ff6ee10cc2a9eb87bc4ff95934c25c337b83bc1bee9dc2749214dfd5b71ba963

    SHA512

    d28cc5cd9f14dd31bdffd70e791fff0dbd169bbf645ffd1c4546585ee4649d685b53c6a50d0a22441d845c158e4cdbd85cd7bb7bee0c717e9203c122e23cba99

  • C:\Users\Admin\AppData\Local\Temp\YandexSearch00000.log

    Filesize

    35KB

    MD5

    74520da85f9c6136f732682d65f2929d

    SHA1

    a9ade3f8f8c131ed4a4507b338dda606dad1c375

    SHA256

    102aa5d80f91454c521979510c0fa4203855e5c9acb6fda82a4709f6abd758c4

    SHA512

    ca31bac783334526c8ca5ba029c92e7ebaa0aca47c3dce8006b02550446fcc7371bbea6700aaabe5cd320aa34d4966055a7f1f788915a6cd05dec9725b477848

  • C:\Users\Admin\AppData\Local\Temp\clids-yasearch.xml

    Filesize

    531B

    MD5

    82bc397cd7cd74f1253306d9e1a469e1

    SHA1

    42f2b9075fd7b3674b705c20ffb7d76b0188b579

    SHA256

    222418f9dadbdfef52f2662ecdb97622bf467a7aea865c1b1547368e86e32a0f

    SHA512

    aa401bdbb7b1425c8c6950a72b7beb67957315eaaf089eaab20710491597d9dbfe0c9951763d86ebc6983aa20eb7b9081bb297e226b2159d359ebff6bb7e7d78

  • C:\Users\Admin\AppData\Local\Temp\vendor00000.xml

    Filesize

    568B

    MD5

    1adb8c543ab77a85efa0f6a8813d5f96

    SHA1

    9e46c70eb446ebd54f797602cfe612e0a697e938

    SHA256

    f1ea3195777f399e830361b0bc72309942c827c365883963a8ebc887cb9ee26c

    SHA512

    7a58b4f746725f93e43a2b187405d8486f1881b02db9a0da15154270465ea52803c09ac8b0ff9ac560ca2e9143c04492af1289fada44e401acf5a9a56d660f1c

  • C:\Users\Admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msi

    Filesize

    12.9MB

    MD5

    f3150312ac37eaad7e1dee3ecc9028f9

    SHA1

    9c94f0bccab3d3124c77805c2739fbd1982516c3

    SHA256

    767ec72547aff3f42737f89c8dbf8ae043a050b924093e4ff8dc1c83aed3ce61

    SHA512

    74c94f7f7c95c1f7bff5a616e74d656899e89c74b85b576164253ae298dd189206f23289f0dd9d45fc3d15bfbbd24b09358c02688330a3c7fa5e8dd0edc7ac13

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\nahd6ha2.default\places.sqlite

    Filesize

    68KB

    MD5

    d57cd95de07d3b15eb5cf8baa80471af

    SHA1

    322c0e13f2022ab255a8d2a50c5835779b6ccc3e

    SHA256

    651efdc8961efbf6476e4cc4b3965a4da72690ebedda009fd800c6d936a67696

    SHA512

    2e98256a9e76ae384f88b83075a321f60cb13ee6f7e8cb93f1919103b82ba79a67b5eec8a7d3043fe26b377fae58545e82323813897c0e67adfacaa885d6f68e

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Bookmarks-2024582502.355082355.backup

    Filesize

    1KB

    MD5

    3adec702d4472e3252ca8b58af62247c

    SHA1

    35d1d2f90b80dca80ad398f411c93fe8aef07435

    SHA256

    2b167248e8136c4d45c2c46e2bff6fb5e5137dd4dfdccde998599be2df2e9335

    SHA512

    7562e093d16ee6305c1bb143a3f5d60dafe8b5de74952709abc68a0c353b65416bf78b1fa1a6720331615898848c1464a7758c5dfe78f8098f77fbfa924784c0

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Preferences-2024582502.355082355.backup

    Filesize

    313B

    MD5

    af006f1bcc57b11c3478be8babc036a8

    SHA1

    c3bb4fa8c905565ca6a1f218e39fe7494910891e

    SHA256

    ed6a32e11cc99728771989b01f5ae813de80c46a59d3dc68c23a4671a343cb8c

    SHA512

    3d20689b0f39b414349c505be607e6bfc1f33ac401cf62a32f36f7114e4a486552f3e74661e90db29402bb85866944e9f8f31baba9605aa0c6def621511a26af

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    4f70b6ad464249bececc426ef95a49fa

    SHA1

    5265689a0690ae09333de8fb87f5a04f9285a121

    SHA256

    325e350cf99a8e278300419d845062de62c32eded7d696a92927d40825fb1a30

    SHA512

    877a9577a6f87b73237dbecd6f48206c19be6e09df41a69a5616ec252b77103a15a9fda8831e8ebd7da028416fa2dea7af53a88c534e40138e6a5c714c7f6faf

  • C:\Windows\Installer\MSIBB9F.tmp

    Filesize

    172KB

    MD5

    55d336aa2dcb71fbab59e70c77336b0b

    SHA1

    0166fb57f7551a31824aa8ec1b149603f52acc84

    SHA256

    335a289968e8bab2fddb8d313fd507244d63b99d3f23413e28436949497e155e

    SHA512

    ab938766bc959ea2f9e8ea6a92a63a2b64b1f7ba98c0aa31157f0916224535e893acf68b8f66debeb4413736aed7f23250a256c9928095b10c6e2235e466c37a

  • C:\Windows\Installer\MSIBC6B.tmp

    Filesize

    189KB

    MD5

    b6cecadf6fc63d78c21e33ae48e84bf3

    SHA1

    2ef9e6a91403d654fa5a4502f7cf1fbec9a9fa5a

    SHA256

    20f0324d2b5c42895c27d4ed64756d3521994c69e8537f14e6a5c51c870bc659

    SHA512

    06b1f88a1952c7cd05af7ea272587ac3b191d49a9386c64978af485256bb675086d13e72efa7247d808efed44b3c57107703ec14c9ca72f929f19fc3a5d426dc

  • C:\Windows\Installer\MSIBE48.tmp

    Filesize

    168KB

    MD5

    a0962dd193b82c1946dc67e140ddf895

    SHA1

    7f36c38d80b7c32e750e22907ac7e1f0df76e966

    SHA256

    b9e73e5ab78d033e0328fc74a9e4ebbd1af614bc4a7c894beb8c59d24ee3ede9

    SHA512

    118b0bd2941d48479446ed16ab23861073d23f9cc815f5f1d380f9977f18c34a71f61496c78b77b9a70f8b0a6cd08fe1edc1adb376dad5762ad0dd2068c64751