Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe
-
Size
13.6MB
-
MD5
734ba749faa3bded8bf6c7568251b828
-
SHA1
2cbb734fc3f6a6c858bddc3e40d41eb1f80888b2
-
SHA256
2ae20ed4c587cc4014673f04ef7e93b06ad2004aa5600448f7ebc5e84fa482e1
-
SHA512
9095306a61fddebb6eea30e6a1e20f42b97185ba6d47c8c8a7fa2c453f86ba2db7d78403018358e5301ff3b53ed849d4928219a9c34b9601288f2245237c4e8b
-
SSDEEP
196608:qtw4OJkEPIH+d8eSzwE4EhpZtw4OJkEPIH+d8eSzwE4EhpHFKzYN:qtw4OSUZd8eSbztw4OSUZd8eSb
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 11 IoCs
resource yara_rule behavioral2/memory/2128-9-0x0000000000400000-0x000000000081C000-memory.dmp warzonerat behavioral2/memory/4944-13-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral2/memory/4944-15-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral2/memory/4944-14-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral2/memory/4944-16-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral2/files/0x00080000000234dd-24.dat warzonerat behavioral2/memory/4944-119-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral2/memory/3248-210-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral2/memory/3248-211-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral2/memory/3248-221-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat behavioral2/memory/3248-244-0x0000000000400000-0x00000000004E3000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 4156 ._cache_2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 2540 Synaptics.exe 4424 Synaptics.exe 3248 Synaptics.exe 1256 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2400 set thread context of 2128 2400 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 89 PID 2128 set thread context of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2540 set thread context of 4424 2540 Synaptics.exe 93 PID 4424 set thread context of 3248 4424 Synaptics.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2008 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2008 EXCEL.EXE 2008 EXCEL.EXE 2008 EXCEL.EXE 2008 EXCEL.EXE 2008 EXCEL.EXE 2008 EXCEL.EXE 2008 EXCEL.EXE 2008 EXCEL.EXE 2008 EXCEL.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2128 2400 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 89 PID 2400 wrote to memory of 2128 2400 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 89 PID 2400 wrote to memory of 2128 2400 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 89 PID 2400 wrote to memory of 2128 2400 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 89 PID 2400 wrote to memory of 2128 2400 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 89 PID 2400 wrote to memory of 2128 2400 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 89 PID 2400 wrote to memory of 2128 2400 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 89 PID 2400 wrote to memory of 2128 2400 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 89 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 2128 wrote to memory of 4944 2128 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 90 PID 4944 wrote to memory of 4156 4944 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 91 PID 4944 wrote to memory of 4156 4944 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 91 PID 4944 wrote to memory of 4156 4944 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 91 PID 4944 wrote to memory of 2540 4944 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 92 PID 4944 wrote to memory of 2540 4944 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 92 PID 4944 wrote to memory of 2540 4944 2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe 92 PID 2540 wrote to memory of 4424 2540 Synaptics.exe 93 PID 2540 wrote to memory of 4424 2540 Synaptics.exe 93 PID 2540 wrote to memory of 4424 2540 Synaptics.exe 93 PID 2540 wrote to memory of 4424 2540 Synaptics.exe 93 PID 2540 wrote to memory of 4424 2540 Synaptics.exe 93 PID 2540 wrote to memory of 4424 2540 Synaptics.exe 93 PID 2540 wrote to memory of 4424 2540 Synaptics.exe 93 PID 2540 wrote to memory of 4424 2540 Synaptics.exe 93 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 4424 wrote to memory of 3248 4424 Synaptics.exe 94 PID 3248 wrote to memory of 1256 3248 Synaptics.exe 95 PID 3248 wrote to memory of 1256 3248 Synaptics.exe 95 PID 3248 wrote to memory of 1256 3248 Synaptics.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\._cache_2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4156
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1256
-
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.6MB
MD5734ba749faa3bded8bf6c7568251b828
SHA12cbb734fc3f6a6c858bddc3e40d41eb1f80888b2
SHA2562ae20ed4c587cc4014673f04ef7e93b06ad2004aa5600448f7ebc5e84fa482e1
SHA5129095306a61fddebb6eea30e6a1e20f42b97185ba6d47c8c8a7fa2c453f86ba2db7d78403018358e5301ff3b53ed849d4928219a9c34b9601288f2245237c4e8b
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2024-08-20_734ba749faa3bded8bf6c7568251b828_magniber.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
132KB
MD5ea15890b9eca7ebe540e1ebcdbd0ce5a
SHA14536ad88bcac07f6cba0c8cc300a0b333c0a6c45
SHA2569b8556cccc608749131c32f145cdb6dcfaa5b0ec5304b597bab65a6cb5cb65f8
SHA5128d1545991d8413ff57effce63208b81d2a2afea6126e62d7c71eca02d227d4417d141b008b42d30ea3fa7b999eed0b8de5734e4ab6d939623d6497fd56742f25
-
Filesize
21KB
MD5cb9a400c374064b8b4f68b94d5df1772
SHA1e9cd0f33167086e4c82d7046ab9337e7795842cd
SHA25698eec6d2214072f1ef34dd264b16e83e18416cd119e02a6361221542064cb6a0
SHA5126d4283c0d8cbdd98ad528e01206ac133853eca140393f9f62ce1e3d81ac9ab7aa5552c2250a0de4f609ff5e28b299109f9641c576b0608d229e57d8b4980dd55
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04