Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-10-2024 02:22
Behavioral task
behavioral1
Sample
2024-10-26_d5c8e02ae89291f7124be813136aafeb_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-26_d5c8e02ae89291f7124be813136aafeb_magniber.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-26_d5c8e02ae89291f7124be813136aafeb_magniber.exe
-
Size
13.0MB
-
MD5
d5c8e02ae89291f7124be813136aafeb
-
SHA1
01c7c9edab95208062cb018fda5ac2bf0483bdef
-
SHA256
29dd77f0013ecbb29bd195d3b35b41d8e684e9044aff886373babf5b8f70fc9b
-
SHA512
be18a14f6d2615ae25640e52e961986810d0c135db3a27dfbf894dd78b5d34583eded9d90f9f26d322143860ce3bd597054c122126c9b2d39e73bc24a0df9a55
-
SSDEEP
196608:7ppYohz43D+vplN8OrfaV+1PbmKaqPQw0uLEW1:7ppYYz43DcC8VbiqIw0uIW1
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral1/memory/2348-17-0x0000000000400000-0x0000000001109000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2348 2024-10-26_d5c8e02ae89291f7124be813136aafeb_magniber.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-26_d5c8e02ae89291f7124be813136aafeb_magniber.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 2024-10-26_d5c8e02ae89291f7124be813136aafeb_magniber.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2348 2024-10-26_d5c8e02ae89291f7124be813136aafeb_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-26_d5c8e02ae89291f7124be813136aafeb_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-26_d5c8e02ae89291f7124be813136aafeb_magniber.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD508b14bd8d0f13e0fdd41c584a18f761e
SHA108d864c414c4d58c20a3cf12c21f69d03ae09c41
SHA25615bcfff27846412c206acbc9de771e7d870870a47ca7589ed0a94bce9734ea36
SHA512d6e3b21051367f20f6bbacfb0da028927f7d80adefd54855e348fec33315268df9a6903468d495f91dde7ca3ef1fdf71aa51b718302d03711d97a74f96274b6a