Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe
-
Size
9.0MB
-
MD5
57f51de8bcd1c74fe1841b49619170e1
-
SHA1
d163dbe441b4e39f9667cddaa7a9ebd096c026e5
-
SHA256
2fc7f05316838c13b3fd3c9f00c701d54a1925effef0879f76daa3513597fc49
-
SHA512
930e2346bc254e849831442f8a893e6453f753f1da7f9370cfa710d6bca68bc372c0d1868099f970113d8ecab987bca1765fc963a0151a5e879b7b3607cb8f68
-
SSDEEP
98304:wg17tiPFr9OxnKEBfN5Ksd+i6Vwf4s9uPwpfzpiOFwjU0sCq5Rh5vj1bBBxaO:wgpsNEnBDzonVrbOI7Dq5RZBBx
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BAE15AFE-BCBB-5F13-556F-D8300E8986B8}\InProcServer32 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BAE15AFE-BCBB-5F13-556F-D8300E8986B8}\InProcServer32\ThreadingModel = "Apartment" 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BAE15AFE-BCBB-5F13-556F-D8300E8986B8}\ShellFolder\Attributes = "538443776" 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BAE15AFE-BCBB-5F13-556F-D8300E8986B8}\LocalizedString = "@%SystemRoot%\\system32\\SearchFolder.dll,-30523" 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BAE15AFE-BCBB-5F13-556F-D8300E8986B8}\DefaultIcon 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BAE15AFE-BCBB-5F13-556F-D8300E8986B8}\DefaultIcon\ = "@%SystemRoot%\\system32\\SearchFolder.dll,-323" 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BAE15AFE-BCBB-5F13-556F-D8300E8986B8}\ShellFolder 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BAE15AFE-BCBB-5F13-556F-D8300E8986B8} 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BAE15AFE-BCBB-5F13-556F-D8300E8986B8}\ = "CLSID_SearchFolder" 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BAE15AFE-BCBB-5F13-556F-D8300E8986B8}\InProcServer32\ = "%SystemRoot%\\SysWow64\\SearchFolder.dll" 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\ProgramData\TEMP:4F9C4674 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe File created C:\ProgramData\TEMP:4F9C4674 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 2088 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Token: SeIncBasePriorityPrivilege 2088 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Token: 33 2088 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Token: SeIncBasePriorityPrivilege 2088 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Token: 33 2088 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe Token: SeIncBasePriorityPrivilege 2088 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2088 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe 2088 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe 2088 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe 2088 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2088 1308 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe 30 PID 1308 wrote to memory of 2088 1308 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe 30 PID 1308 wrote to memory of 2088 1308 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe 30 PID 1308 wrote to memory of 2088 1308 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe 30 PID 1308 wrote to memory of 2088 1308 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe 30 PID 1308 wrote to memory of 2088 1308 2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-28_57f51de8bcd1c74fe1841b49619170e1_magniber.exe"2⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111B
MD5f3e6ec6cd6ea5ca706e21116ddf745e6
SHA10ef25de2d2a9b9890dc6812578b4f7b924c45aba
SHA2569d93dd488b347e5f4abd8d0ced90b69d6bffae4afe5ccb1ccefe3312c54ff268
SHA512663d1688e460478f5b025154ddbf472b5e67306aedc950b83437cc0829e9218b89c0b41f783dfe5ac4993652dee22f43612e848e2ad77f690ff9663805923940