General
-
Target
2024-10-09_d46d537af6048491d43f5ee3e47c5da6_hijackloader_jeefo_magniber
-
Size
6.5MB
-
Sample
241009-r2dkfs1gnc
-
MD5
d46d537af6048491d43f5ee3e47c5da6
-
SHA1
5b1d6751187d01ff5930cfee64e85b96138bdaef
-
SHA256
db2d7e21bae2b95afaf1e80149a1c0d107e26c469a06b45939712a65d6122763
-
SHA512
e9d5b655e4ab1ed439b070b8483d91c30d7dd5565431fc7512b66079f6908c923ec162e9740809140219bc1a0781716f220d31fdf539d0a4fe87412bcaba3b2a
-
SSDEEP
196608:OlOnP6tx1DBvNDgio+rRhbSgIzH1a43r0VKob0Iqg1KNkN:Sx1DlNZoMbB
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_d46d537af6048491d43f5ee3e47c5da6_hijackloader_jeefo_magniber.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-09_d46d537af6048491d43f5ee3e47c5da6_hijackloader_jeefo_magniber.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-10-09_d46d537af6048491d43f5ee3e47c5da6_hijackloader_jeefo_magniber
-
Size
6.5MB
-
MD5
d46d537af6048491d43f5ee3e47c5da6
-
SHA1
5b1d6751187d01ff5930cfee64e85b96138bdaef
-
SHA256
db2d7e21bae2b95afaf1e80149a1c0d107e26c469a06b45939712a65d6122763
-
SHA512
e9d5b655e4ab1ed439b070b8483d91c30d7dd5565431fc7512b66079f6908c923ec162e9740809140219bc1a0781716f220d31fdf539d0a4fe87412bcaba3b2a
-
SSDEEP
196608:OlOnP6tx1DBvNDgio+rRhbSgIzH1a43r0VKob0Iqg1KNkN:Sx1DlNZoMbB
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Discovery
Network Service Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
5System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1