Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe
-
Size
292KB
-
MD5
eb956740e31bf342df9cfc36f7c95426
-
SHA1
867f32075bdd44738e462e949d9c820c4f145666
-
SHA256
2830a5bea9b2bb73f308d422d70751a92b5298cbb547bc9aa0d93bdfe1d00717
-
SHA512
43f72806ad265affceb8d85ef52b14d07fb4bae11acc467bcd6401487e1117955719487071b41a608ea98214a39d7cf58dce5ccd644743a5d85fbc798313e46c
-
SSDEEP
3072:jNdkchM4eJY+kPsSNxq8RPCUek4pZhzVB+Nm+5XNtOCq+IYKC9ADQFcgtgVsN6fr:BzhM4em+kPsgzr4tSRq+IYKEA0bN67f
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe -
Executes dropped EXE 2 IoCs
pid Process 2120 winmgr.exe 4888 winmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-5050259729679027539035209642065\\winmgr.exe" 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-5050259729679027539035209642065\\winmgr.exe" 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 336 set thread context of 5012 336 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 94 PID 2120 set thread context of 4888 2120 winmgr.exe 98 -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.ZipFile.dll winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.ZipFile.dll winmgr.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.ZipFile.dll winmgr.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe winmgr.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\M-5050259729679027539035209642065 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe File created C:\Windows\M-5050259729679027539035209642065\winmgr.exe 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe File opened for modification C:\Windows\M-5050259729679027539035209642065\winmgr.exe 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winmgr.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 336 wrote to memory of 5012 336 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 94 PID 336 wrote to memory of 5012 336 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 94 PID 336 wrote to memory of 5012 336 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 94 PID 336 wrote to memory of 5012 336 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 94 PID 336 wrote to memory of 5012 336 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 94 PID 336 wrote to memory of 5012 336 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 94 PID 336 wrote to memory of 5012 336 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 94 PID 336 wrote to memory of 5012 336 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 94 PID 336 wrote to memory of 5012 336 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 94 PID 5012 wrote to memory of 2904 5012 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 95 PID 5012 wrote to memory of 2904 5012 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 95 PID 5012 wrote to memory of 2904 5012 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 95 PID 5012 wrote to memory of 2120 5012 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 96 PID 5012 wrote to memory of 2120 5012 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 96 PID 5012 wrote to memory of 2120 5012 2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe 96 PID 2120 wrote to memory of 4888 2120 winmgr.exe 98 PID 2120 wrote to memory of 4888 2120 winmgr.exe 98 PID 2120 wrote to memory of 4888 2120 winmgr.exe 98 PID 2120 wrote to memory of 4888 2120 winmgr.exe 98 PID 2120 wrote to memory of 4888 2120 winmgr.exe 98 PID 2120 wrote to memory of 4888 2120 winmgr.exe 98 PID 2120 wrote to memory of 4888 2120 winmgr.exe 98 PID 2120 wrote to memory of 4888 2120 winmgr.exe 98 PID 2120 wrote to memory of 4888 2120 winmgr.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-22_eb956740e31bf342df9cfc36f7c95426_magniber.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kcadtyqcsg.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Windows\M-5050259729679027539035209642065\winmgr.exeC:\Windows\M-5050259729679027539035209642065\winmgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\M-5050259729679027539035209642065\winmgr.exeC:\Windows\M-5050259729679027539035209642065\winmgr.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4888
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD5dc309298b21667ba998da98b2a29c330
SHA1f6903d51720de2f962f9a6af29d6ebd613cb3de5
SHA25655485f00a399affcc3f9e972d71f2228dff617bdfafa8c615b160b0a0c19956b
SHA512f51ffa28341e86c56c1203394f9b5b68da170cc5be9414ef214db4a686c1e2cfa3a6a893dc3dc8d4c2a23630fc9ff881ed9f03c602fbee718c6de5a5924d9a71
-
Filesize
293KB
MD5bed8cfbf66cd40ba0dcf85d56b2d1200
SHA19e21f90c30057983fcfbd233c6e7c6fc5bc3b27e
SHA2560f21cf9555777f75e33564e09bb51c0afcbc483b6a38e3eabd8e11ffe9dcd312
SHA51264152cb6bd68205578e516411b2f995ba5b6658a07888466b784d97e0fb5a37ea98ffc98b43ff94473c8f02fec5242cac29f012ec557f73b1bda100f61ed351b
-
Filesize
292KB
MD5eb956740e31bf342df9cfc36f7c95426
SHA1867f32075bdd44738e462e949d9c820c4f145666
SHA2562830a5bea9b2bb73f308d422d70751a92b5298cbb547bc9aa0d93bdfe1d00717
SHA51243f72806ad265affceb8d85ef52b14d07fb4bae11acc467bcd6401487e1117955719487071b41a608ea98214a39d7cf58dce5ccd644743a5d85fbc798313e46c