Analysis

  • max time kernel
    139s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 06:58

General

  • Target

    2024-07-11_8ccb0bcfefa590ef3d8e5fef5c3bffb0_magniber.exe

  • Size

    3.1MB

  • MD5

    8ccb0bcfefa590ef3d8e5fef5c3bffb0

  • SHA1

    70f61070d44b01ba6aaa8ba1599e4cb1def8e06a

  • SHA256

    50530af27f1d74f40cd7c79212eca238094d6569a993cf55626e1d3b6054be7f

  • SHA512

    e2541d8c334cc6a197e4c0807645de830482894f0d63addeff1652bf9c3d7b29b122546a67871a599ffd8f493c966456427040ad36e126ec9fb7c8b271a881eb

  • SSDEEP

    24576:oNlaW5n274tWa9spc1pTG05RwbLR1bsJbKkKF/eMNPj9fofjFr5N:oSW5wpcXG1Zc9KFeM7fof9

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-11_8ccb0bcfefa590ef3d8e5fef5c3bffb0_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-11_8ccb0bcfefa590ef3d8e5fef5c3bffb0_magniber.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2736-0-0x00000000006B0000-0x00000000007A8000-memory.dmp

    Filesize

    992KB

  • memory/2736-1-0x00000000006B0000-0x00000000007A8000-memory.dmp

    Filesize

    992KB

  • memory/2736-5-0x00000000006B0000-0x00000000007A8000-memory.dmp

    Filesize

    992KB