Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe
-
Size
14.2MB
-
MD5
74963de58f863553d29885b7c88a1e71
-
SHA1
11606e31eea1aaaf2aead78e173c493dd1c5f27b
-
SHA256
bc7699bff0a4297edcdc3b9d37f107d9f521ef87fa23aa81337fcea52e96357a
-
SHA512
939072c17bf3555a735a9cc3720aa51b54027267ccea8a6fc969bd68aa5919e4d8d2aa75d89353b9732e7e69bb82e6f508988abb1df5f8c26f3f02a5177134ef
-
SSDEEP
98304:OGwqwpAEdmDbNdL2WQljnUZxlKzS6I+Y0EjT9s9o36:rDbNdiUxlKzY0EjTC
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016210-9.dat family_blackmoon -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Q5SLQ90Obj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Q5SLQ90Obj = "C:\\Users\\Admin\\AppData\\Roaming\\aokhn\\s287SaQPA_CV7meFl4Nn\\Q5SLQ90Obj.exe" Q5SLQ90Obj.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 Q5SLQ90Obj.exe -
Loads dropped DLL 1 IoCs
pid Process 2844 Q5SLQ90Obj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q5SLQ90Obj.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2844 Q5SLQ90Obj.exe 2844 Q5SLQ90Obj.exe 2844 Q5SLQ90Obj.exe 2844 Q5SLQ90Obj.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2844 Q5SLQ90Obj.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 2112 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 2844 Q5SLQ90Obj.exe 2844 Q5SLQ90Obj.exe 2844 Q5SLQ90Obj.exe 2844 Q5SLQ90Obj.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2112 2316 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 31 PID 2316 wrote to memory of 2112 2316 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 31 PID 2316 wrote to memory of 2112 2316 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 31 PID 2112 wrote to memory of 2844 2112 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 32 PID 2112 wrote to memory of 2844 2112 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 32 PID 2112 wrote to memory of 2844 2112 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 32 PID 2112 wrote to memory of 2844 2112 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 46053F0559055005760560057705760559054405610568056C056B0559054405750575054105640571056405590557056A05640568056C056B056205590564056A056E056D056B055905760537053D053205560564055405550544055A05460553053205680560054305690531054B056B055905540530055605490554053C0535054A0567056F05--aa`2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\aokhn\s287SaQPA_CV7meFl4Nn\Q5SLQ90Obj.exe"C:\Users\Admin\AppData\Roaming\aokhn\s287SaQPA_CV7meFl4Nn\Q5SLQ90Obj.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5b0713694f37e94697f1698bad4beee33
SHA1a9efc94625ef7568a025447648ba7aacc984fad0
SHA25671dc40443fa4c7ebb7c02ac1e13261fbe9b91a22bde79d27e1833f0bd4bd7e21
SHA512f6f922e87a80c938eda7f09d59864f48a6d7c5e4f79680e2af114cd5fbe093923de510d6efd355d8fd89b5ce69430829e5e659379196910b4b2f658e312363a0
-
Filesize
146KB
MD5ae1817f4788e6733af457bd5dff46289
SHA132ba5f36e80c28f256204fa3abda0ab2774d8af8
SHA25608ccea61d93eb33675dffdeda73003d57b8f6710db4f9d98a5ec398a377101cd
SHA5126c73589e5b2a540fa116cf11f8871acd4b0c391a22f6adad28ac07b9144150762faf6153cde82a2b661f93d4b9c36a73aff5438ebe31515869e79a397a6d1d01
-
Filesize
493B
MD5d1a1666b76cf5e9d8bd4f19e37801225
SHA1e5bff206b78273c0b9fa12521915d1b66c0c6c2c
SHA256c4db940cd209c6f53e65ea5ae2171e80273b9ad7c7a8756d70a74fdda7b74019
SHA512c34b4c9e25adb903fe8c13a2e4841f5dbd666f5285559da21e1dbb4fdafe72154ac52d4e99d628de47744db4d73edd554c22184528001a4b29c284ae163ad6f2