Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe
-
Size
14.2MB
-
MD5
74963de58f863553d29885b7c88a1e71
-
SHA1
11606e31eea1aaaf2aead78e173c493dd1c5f27b
-
SHA256
bc7699bff0a4297edcdc3b9d37f107d9f521ef87fa23aa81337fcea52e96357a
-
SHA512
939072c17bf3555a735a9cc3720aa51b54027267ccea8a6fc969bd68aa5919e4d8d2aa75d89353b9732e7e69bb82e6f508988abb1df5f8c26f3f02a5177134ef
-
SSDEEP
98304:OGwqwpAEdmDbNdL2WQljnUZxlKzS6I+Y0EjT9s9o36:rDbNdiUxlKzY0EjTC
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234cb-13.dat family_blackmoon -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run R287Q5D4Ang1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\R287Q5D4Ang1 = "C:\\Users\\Admin\\AppData\\Roaming\\aokhn\\l0RYDjQ73_9RF32QHQ\\R287Q5D4Ang1.exe" R287Q5D4Ang1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe -
Executes dropped EXE 1 IoCs
pid Process 4336 R287Q5D4Ang1.exe -
Loads dropped DLL 1 IoCs
pid Process 4336 R287Q5D4Ang1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R287Q5D4Ang1.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4336 R287Q5D4Ang1.exe 4336 R287Q5D4Ang1.exe 4336 R287Q5D4Ang1.exe 4336 R287Q5D4Ang1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4336 R287Q5D4Ang1.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4880 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 4476 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 4336 R287Q5D4Ang1.exe 4336 R287Q5D4Ang1.exe 4336 R287Q5D4Ang1.exe 4336 R287Q5D4Ang1.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4476 4880 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 83 PID 4880 wrote to memory of 4476 4880 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 83 PID 4476 wrote to memory of 4336 4476 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 93 PID 4476 wrote to memory of 4336 4476 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 93 PID 4476 wrote to memory of 4336 4476 2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_74963de58f863553d29885b7c88a1e71_magniber.exe 46053F0559055005760560057705760559054405610568056C056B0559054405750575054105640571056405590557056A05640568056C056B056205590564056A056E056D056B0559056905350557055C0541056F055405320536055A053C05570543053605370554054D0554055905570537053D053205540530054105310544056B0562053405--aa`2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Roaming\aokhn\l0RYDjQ73_9RF32QHQ\R287Q5D4Ang1.exe"C:\Users\Admin\AppData\Roaming\aokhn\l0RYDjQ73_9RF32QHQ\R287Q5D4Ang1.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4336
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5b0713694f37e94697f1698bad4beee33
SHA1a9efc94625ef7568a025447648ba7aacc984fad0
SHA25671dc40443fa4c7ebb7c02ac1e13261fbe9b91a22bde79d27e1833f0bd4bd7e21
SHA512f6f922e87a80c938eda7f09d59864f48a6d7c5e4f79680e2af114cd5fbe093923de510d6efd355d8fd89b5ce69430829e5e659379196910b4b2f658e312363a0
-
Filesize
146KB
MD5ae1817f4788e6733af457bd5dff46289
SHA132ba5f36e80c28f256204fa3abda0ab2774d8af8
SHA25608ccea61d93eb33675dffdeda73003d57b8f6710db4f9d98a5ec398a377101cd
SHA5126c73589e5b2a540fa116cf11f8871acd4b0c391a22f6adad28ac07b9144150762faf6153cde82a2b661f93d4b9c36a73aff5438ebe31515869e79a397a6d1d01
-
Filesize
493B
MD5d1a1666b76cf5e9d8bd4f19e37801225
SHA1e5bff206b78273c0b9fa12521915d1b66c0c6c2c
SHA256c4db940cd209c6f53e65ea5ae2171e80273b9ad7c7a8756d70a74fdda7b74019
SHA512c34b4c9e25adb903fe8c13a2e4841f5dbd666f5285559da21e1dbb4fdafe72154ac52d4e99d628de47744db4d73edd554c22184528001a4b29c284ae163ad6f2