Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe
-
Size
12.2MB
-
MD5
c16f1e6a4746acb3a0cedd2a4915f547
-
SHA1
4784734f20b48dcfb8a94f5189c09e62239cfd26
-
SHA256
56488612ad1b2f67e86472e98fb60788addefb947c930652d361651ce14e1ea6
-
SHA512
3896bf97798337d7652a460904a20ad78fd9231009d30354a8923bd91584ca47317c5e5f658968eb3a1ece284c1369fffce8c3dc0f46283f12c647a91da6f2d4
-
SSDEEP
196608:FbJRocy8nfhgzI2Mofx6flJivh6nqrnY1h4ga9BvqQbsNrqNm2R7U:F9Q8n0I2Tvh6grgaXr4rqNz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FF8EFF09-2CE0-443F-B774-755550B4AFB5} 2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FF8EFF09-2CE0-443F-B774-755550B4AFB5}\LaunchPermission = 010014804c0000005c000000140000003000000002001c0001000000110014000400000001010000000000100010000002001c0001000000000014000b0000000101000000000001000000000102000000000005200000002002000001020000000000052000000020020000 2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{FF8EFF09-2CE0-443F-B774-755550B4AFB5}\AccessPermission = 010014804c0000005c000000140000003000000002001c0001000000110014000400000001010000000000100010000002001c0001000000000014000b0000000101000000000001000000000102000000000005200000002002000001020000000000052000000020020000 2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2544 2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe 2544 2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe 2544 2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe 2544 2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2544 2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-07_c16f1e6a4746acb3a0cedd2a4915f547_hijackloader_magniber.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2544