Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 11:44

General

  • Target

    2024-11-19_631d626325a8991fcb9616c2a3c612e2_hijackloader_mafia_magniber.exe

  • Size

    20.0MB

  • MD5

    631d626325a8991fcb9616c2a3c612e2

  • SHA1

    599f318584329b8a4ae3975092c0dd0a12229888

  • SHA256

    6ec14fd7e96762761a912f5b2bf9009dbecc413ca8f9375eaeedb21e98a83e17

  • SHA512

    4eba52fcca3c0cdcdf3bf99a11708420cfc3e2cc9eb4794a70cb74e6a283485359824177374f3465b6f47fe72f5f88cd1a5ad22656b252247630109ce181f12e

  • SSDEEP

    393216:LY/p7GOV8D4tUtdcgLr+ztEOXEZMf6o0a0X:LspiOQ/rQZXEZA6aQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-19_631d626325a8991fcb9616c2a3c612e2_hijackloader_mafia_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-19_631d626325a8991fcb9616c2a3c612e2_hijackloader_mafia_magniber.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2116-0-0x0000000001A38000-0x0000000001E04000-memory.dmp

    Filesize

    3.8MB

  • memory/2116-3-0x00000000000F0000-0x0000000000100000-memory.dmp

    Filesize

    64KB

  • memory/2116-2-0x00000000000F0000-0x0000000000100000-memory.dmp

    Filesize

    64KB

  • memory/2116-1-0x0000000001250000-0x0000000002667000-memory.dmp

    Filesize

    20.1MB

  • memory/2116-4-0x0000000001250000-0x0000000002667000-memory.dmp

    Filesize

    20.1MB

  • memory/2116-5-0x0000000001A38000-0x0000000001E04000-memory.dmp

    Filesize

    3.8MB

  • memory/2116-6-0x0000000001250000-0x0000000002667000-memory.dmp

    Filesize

    20.1MB