Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 03:43

General

  • Target

    2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe

  • Size

    10.6MB

  • MD5

    922e0ce72b23593266b0486c19a6f6f0

  • SHA1

    f0cb61f5fdc2c2d32f9d6155809ef2bcd629c154

  • SHA256

    6af7f530b868da31e2c20ab699720cc32e307bb21df009209bfd17499986edee

  • SHA512

    86a364059f8b8822577c46b5b884e465a57c210549e4ddab5fa3a105f5152f7ec687cb62f04f5a5ea4e014a3e036016498581d2a99c88e16961093b2df835c14

  • SSDEEP

    98304:+YBKqmTVA7id7RyFZ+bhz4NjufFYBKqmTVA7id7RyFZ+bhz4NjufGpFK0U8AmJNl:5iTyybOSSiTyybOSMFKzYN

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 12 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Users\Admin\AppData\Local\Temp\2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe
        "C:\Users\Admin\AppData\Local\Temp\2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe"
        3⤵
        • Checks computer location settings
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4968
        • C:\Users\Admin\AppData\Local\Temp\._cache_2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5024
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3444
          • C:\ProgramData\Synaptics\Synaptics.exe
            "C:\ProgramData\Synaptics\Synaptics.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:224
            • C:\ProgramData\Synaptics\Synaptics.exe
              "C:\ProgramData\Synaptics\Synaptics.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3880
              • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1724
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    10.6MB

    MD5

    922e0ce72b23593266b0486c19a6f6f0

    SHA1

    f0cb61f5fdc2c2d32f9d6155809ef2bcd629c154

    SHA256

    6af7f530b868da31e2c20ab699720cc32e307bb21df009209bfd17499986edee

    SHA512

    86a364059f8b8822577c46b5b884e465a57c210549e4ddab5fa3a105f5152f7ec687cb62f04f5a5ea4e014a3e036016498581d2a99c88e16961093b2df835c14

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe.log

    Filesize

    1KB

    MD5

    8ec831f3e3a3f77e4a7b9cd32b48384c

    SHA1

    d83f09fd87c5bd86e045873c231c14836e76a05c

    SHA256

    7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

    SHA512

    26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

  • C:\Users\Admin\AppData\Local\Temp\._cache_2024-09-08_922e0ce72b23593266b0486c19a6f6f0_magniber.exe

    Filesize

    132KB

    MD5

    ea15890b9eca7ebe540e1ebcdbd0ce5a

    SHA1

    4536ad88bcac07f6cba0c8cc300a0b333c0a6c45

    SHA256

    9b8556cccc608749131c32f145cdb6dcfaa5b0ec5304b597bab65a6cb5cb65f8

    SHA512

    8d1545991d8413ff57effce63208b81d2a2afea6126e62d7c71eca02d227d4417d141b008b42d30ea3fa7b999eed0b8de5734e4ab6d939623d6497fd56742f25

  • C:\Users\Admin\AppData\Local\Temp\K62q51b5.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\K62q51b5.xlsm

    Filesize

    21KB

    MD5

    a20000f2978dd3f18830506f9e21c570

    SHA1

    b0ddb0186e102e3e4514d8a8d9841756e02191a1

    SHA256

    44eb3baadb96d62f785d1c19cfdca4834f2ea0a81bbc64b8643f96f2716a2d95

    SHA512

    4ba2d2befdcd45ba51db9d4d0b6138ae422f774eb4467ad34b57ca8c97dd4de4d0faafdf244a90e6967f16d085fb39cb2e50bcc986c8fa9a7210a8175b79e8f1

  • memory/2932-10-0x0000000074870000-0x0000000075020000-memory.dmp

    Filesize

    7.7MB

  • memory/2932-47-0x0000000074870000-0x0000000075020000-memory.dmp

    Filesize

    7.7MB

  • memory/2932-12-0x0000000074870000-0x0000000075020000-memory.dmp

    Filesize

    7.7MB

  • memory/2932-11-0x0000000005C40000-0x0000000005D52000-memory.dmp

    Filesize

    1.1MB

  • memory/2932-9-0x0000000001170000-0x0000000001412000-memory.dmp

    Filesize

    2.6MB

  • memory/3064-166-0x00007FFDEA510000-0x00007FFDEA520000-memory.dmp

    Filesize

    64KB

  • memory/3064-163-0x00007FFDEA510000-0x00007FFDEA520000-memory.dmp

    Filesize

    64KB

  • memory/3064-169-0x00007FFDE84B0000-0x00007FFDE84C0000-memory.dmp

    Filesize

    64KB

  • memory/3064-168-0x00007FFDE84B0000-0x00007FFDE84C0000-memory.dmp

    Filesize

    64KB

  • memory/3064-164-0x00007FFDEA510000-0x00007FFDEA520000-memory.dmp

    Filesize

    64KB

  • memory/3064-167-0x00007FFDEA510000-0x00007FFDEA520000-memory.dmp

    Filesize

    64KB

  • memory/3064-165-0x00007FFDEA510000-0x00007FFDEA520000-memory.dmp

    Filesize

    64KB

  • memory/3880-219-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/3880-127-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/3880-244-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/3880-220-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/3880-218-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/4888-5-0x0000000006590000-0x000000000659A000-memory.dmp

    Filesize

    40KB

  • memory/4888-1-0x0000000000FE0000-0x0000000001A7C000-memory.dmp

    Filesize

    10.6MB

  • memory/4888-3-0x0000000006460000-0x00000000064F2000-memory.dmp

    Filesize

    584KB

  • memory/4888-8-0x00000000066D0000-0x00000000066D8000-memory.dmp

    Filesize

    32KB

  • memory/4888-2-0x0000000006B60000-0x0000000007104000-memory.dmp

    Filesize

    5.6MB

  • memory/4888-0-0x000000007487E000-0x000000007487F000-memory.dmp

    Filesize

    4KB

  • memory/4888-21-0x0000000074870000-0x0000000075020000-memory.dmp

    Filesize

    7.7MB

  • memory/4888-4-0x0000000074870000-0x0000000075020000-memory.dmp

    Filesize

    7.7MB

  • memory/4888-6-0x0000000006700000-0x00000000069D0000-memory.dmp

    Filesize

    2.8MB

  • memory/4888-7-0x00000000071B0000-0x000000000724C000-memory.dmp

    Filesize

    624KB

  • memory/4968-17-0x0000000003360000-0x0000000003361000-memory.dmp

    Filesize

    4KB

  • memory/4968-122-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/4968-16-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/4968-15-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/4968-13-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/4968-14-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB