Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:17

General

  • Target

    2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe

  • Size

    292KB

  • MD5

    eb956740e31bf342df9cfc36f7c95426

  • SHA1

    867f32075bdd44738e462e949d9c820c4f145666

  • SHA256

    2830a5bea9b2bb73f308d422d70751a92b5298cbb547bc9aa0d93bdfe1d00717

  • SHA512

    43f72806ad265affceb8d85ef52b14d07fb4bae11acc467bcd6401487e1117955719487071b41a608ea98214a39d7cf58dce5ccd644743a5d85fbc798313e46c

  • SSDEEP

    3072:jNdkchM4eJY+kPsSNxq8RPCUek4pZhzVB+Nm+5XNtOCq+IYKC9ADQFcgtgVsN6fr:BzhM4em+kPsgzr4tSRq+IYKEA0bN67f

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe"
      2⤵
      • Modifies security service
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\memscqsonl.bat" "
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2552
      • C:\Windows\M-5050259729679027539035209642065\winmgr.exe
        C:\Windows\M-5050259729679027539035209642065\winmgr.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Windows\M-5050259729679027539035209642065\winmgr.exe
          C:\Windows\M-5050259729679027539035209642065\winmgr.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\memscqsonl.bat

    Filesize

    278B

    MD5

    80922c5144f935b7936d910b6b373de5

    SHA1

    8ca27cd81121d11b3144745f33998ad4837d2a8f

    SHA256

    fa7130dbda02db050beff673ad3ae76485d78dccf9314f2711b01b353cc5f861

    SHA512

    48e91f3f305d40fdd46b1b9a8bfe5b9305ab781836c7075e79e00e14549ce816cdb46328ca6a491fd45ce39155a01997ff808a6480a3a378251ab8dcd481cad0

  • C:\Windows\M-5050259729679027539035209642065\winmgr.exe

    Filesize

    292KB

    MD5

    eb956740e31bf342df9cfc36f7c95426

    SHA1

    867f32075bdd44738e462e949d9c820c4f145666

    SHA256

    2830a5bea9b2bb73f308d422d70751a92b5298cbb547bc9aa0d93bdfe1d00717

    SHA512

    43f72806ad265affceb8d85ef52b14d07fb4bae11acc467bcd6401487e1117955719487071b41a608ea98214a39d7cf58dce5ccd644743a5d85fbc798313e46c

  • memory/1736-44-0x0000000000430000-0x0000000000530000-memory.dmp

    Filesize

    1024KB

  • memory/1736-5-0x0000000003000000-0x0000000003054000-memory.dmp

    Filesize

    336KB

  • memory/1736-0-0x0000000003000000-0x0000000003054000-memory.dmp

    Filesize

    336KB

  • memory/1736-6-0x0000000000430000-0x0000000000530000-memory.dmp

    Filesize

    1024KB

  • memory/2744-9-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2744-10-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2744-4-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2744-8-0x0000000003000000-0x0000000003054000-memory.dmp

    Filesize

    336KB

  • memory/2744-28-0x0000000002320000-0x0000000002374000-memory.dmp

    Filesize

    336KB

  • memory/2744-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2756-37-0x0000000000550000-0x0000000000650000-memory.dmp

    Filesize

    1024KB

  • memory/2756-45-0x0000000003000000-0x0000000003054000-memory.dmp

    Filesize

    336KB

  • memory/2916-41-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB