Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe
-
Size
13.7MB
-
MD5
47226cffd7a6f47d581d71bfc76d9bb4
-
SHA1
d56a4df1de567d94eaded6c31fa9924fda266b86
-
SHA256
5ca833e3d6d7421518eaa6354338cdeb95834be3165cd9f7e8f7a7777679c463
-
SHA512
e4e3550861cee3186ec65bfef1328a138c56bdfbaede822ca9c3814fe662c371224bc807155732139543aa0b4866f0abd73ad2bfbb4db31f1d7f1c527177a612
-
SSDEEP
196608:qrmKsB38Vw1cv7YPgiTXPt5jO5ZeEje+f466+xMdbL5KWeEPoZjWscXvU5Hw:qrmKz/GgizPzjOSYn5xMNLDwxWsc
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E85DB88B-D6D4-CCD5-C08E-38D3EDB39FED}\TreatAs\ = "{F20DA720-C02F-11CE-927B-0800095AE340}" 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IbComparer.Project\shell\ = "open" 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.icp\ = "IbComparer.Project" 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E85DB88B-D6D4-CCD5-C08E-38D3EDB39FED} 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E85DB88B-D6D4-CCD5-C08E-38D3EDB39FED}\TreatAs 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IbComparer.Project\shell 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IbComparer.Project\shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-0~1.EXE %1" 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IbComparer.Project 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IbComparer.Project\DefaultIcon 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.icp 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E85DB88B-D6D4-CCD5-C08E-38D3EDB39FED}\ = "Video Clip" 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IbComparer.Project\ = "Database Comparer for InterBase and Firebird Project" 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IbComparer.Project\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-0~1.EXE,0" 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IbComparer.Project\shell\Open\Command 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IbComparer.Project\shell\Open 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1832 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe Token: SeIncBasePriorityPrivilege 1832 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1832 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe 1832 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe 1832 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe 1832 2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-10_47226cffd7a6f47d581d71bfc76d9bb4_magniber.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7151052d51cbc7dc.customDestinations-ms
Filesize12B
MD5e4a1661c2c886ebb688dec494532431c
SHA1a2ae2a7db83b33dc95396607258f553114c9183c
SHA256b76875c50ef704dbbf7f02c982445971d1bbd61aebe2e4b28ddc58a1d66317d5
SHA512efdcb76fb40482bc94e37eae3701e844bf22c7d74d53aef93ac7b6ae1c1094ba2f853875d2c66a49a7075ea8c69f5a348b786d6ee0fa711669279d04adaac22c