Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe
-
Size
13.6MB
-
MD5
8475897ae4c0384b769d7c0d349a4faa
-
SHA1
533afbca40b0ba2c3650bcc6f0f52c28fb0c0002
-
SHA256
bde9a97dc10c091d43336566a29049d2ec89a96d1c5adec916923079ae3ea438
-
SHA512
8dac5e2010e0bb6be5ea213a3c422a095ed3fb96b55b0bfca4e6c4af5a82d8ccbc08f4517764ea7ccec6857fdd3e3ead7568566a6c03c84cbc9cda8ab4251fa6
-
SSDEEP
393216:doR107ERK2bn8WeXIBqdJymosApDQ9a2XKkJF1OS:6Kwna4QrosApDgUkJFQS
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{53F0DB46-1507-E15E-8A3A-6AAD30F0A399}\InprocServer32\14.0.0.0 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{53F0DB46-1507-E15E-8A3A-6AAD30F0A399}\InprocServer32\14.0.0.0\Assembly = "Microsoft.Office.Interop.Access, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{53F0DB46-1507-E15E-8A3A-6AAD30F0A399} 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{53F0DB46-1507-E15E-8A3A-6AAD30F0A399}\InprocServer32\Class = "Microsoft.Office.Interop.Access.AllDatabaseDiagramsClass" 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{53F0DB46-1507-E15E-8A3A-6AAD30F0A399}\InprocServer32\RuntimeVersion = "v2.0.50727" 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{53F0DB46-1507-E15E-8A3A-6AAD30F0A399}\InprocServer32\14.0.0.0\Class = "Microsoft.Office.Interop.Access.AllDatabaseDiagramsClass" 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{53F0DB46-1507-E15E-8A3A-6AAD30F0A399}\InprocServer32\14.0.0.0\RuntimeVersion = "v2.0.50727" 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{53F0DB46-1507-E15E-8A3A-6AAD30F0A399}\InprocServer32 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{53F0DB46-1507-E15E-8A3A-6AAD30F0A399}\InprocServer32\Assembly = "Microsoft.Office.Interop.Access, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3016 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe Token: SeIncBasePriorityPrivilege 3016 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3016 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe 3016 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe 3016 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe 3016 2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-10_8475897ae4c0384b769d7c0d349a4faa_magniber.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\16fe3138ac4bad13.customDestinations-ms
Filesize12B
MD5e4a1661c2c886ebb688dec494532431c
SHA1a2ae2a7db83b33dc95396607258f553114c9183c
SHA256b76875c50ef704dbbf7f02c982445971d1bbd61aebe2e4b28ddc58a1d66317d5
SHA512efdcb76fb40482bc94e37eae3701e844bf22c7d74d53aef93ac7b6ae1c1094ba2f853875d2c66a49a7075ea8c69f5a348b786d6ee0fa711669279d04adaac22c