Analysis

  • max time kernel
    134s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 08:00

General

  • Target

    2024-08-29_dfe1b778360e0a010a679051e87a2177_magniber.exe

  • Size

    4.8MB

  • MD5

    dfe1b778360e0a010a679051e87a2177

  • SHA1

    543bb27a22ee2bff713da91943294016d6160cb2

  • SHA256

    4e5397f35f6c84866bb1f2e5d125cd0b19fd6ff4d5045ca1f89d1d0eb8369d0f

  • SHA512

    b9f06bf10ec1e89c92e95d7c750806b7d29a3cd0692224764bc55d3c6094344df0a1c820c2384583731e10b368a0c0a492ae6e63670ea07687b5471d06566b1f

  • SSDEEP

    98304:Zszut86yqxsbIH5dpad0nMOJ2GkzH/OnOqHj5/WUF2bPJB/1/GVfFv:OT6yWsbIH5dpxJ2GkbGjlWUFOJBax

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-29_dfe1b778360e0a010a679051e87a2177_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-29_dfe1b778360e0a010a679051e87a2177_magniber.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2368
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 1160
      2⤵
      • Program crash
      PID:2064
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2368 -ip 2368
    1⤵
      PID:5064

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\{A6396241-24ED-4d20-916F-1682C2B7E863}.tmp\7z.dll

            Filesize

            1.2MB

            MD5

            cd479d111eee1dbd85870e1c7477ad4c

            SHA1

            01ff945138480705d5934c766906b2c7c1a32b72

            SHA256

            367f8d1bfcf90ae86c0c33b0c8c9e6ec1c433c353d0663ebb44567607402c83d

            SHA512

            8b801bfbb933e0dc77090555fa258d416cbe9ed780fb1821aed532a979617082b29e0b6f8fb85f73a9e93c98981426c92c498a41c49f823707da3e6b7bb30128