Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 01:29
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe
-
Size
357KB
-
MD5
8e0a909a89438175faf2ac7acf5e721b
-
SHA1
0ac18576c7634bdc07ef0576c38df8036a806c0b
-
SHA256
91a543a24299a0dc22fbec348d090c4a0774f822440f58965ff38da77b82f0e0
-
SHA512
15201efc7fd47c5f3c3d6ec108f2eaf970102e411014a59eaefe17cdd6011fd632310b9e86c1b7a611467bd598b3ca89cb379935f23b3ca7337ca678e232c23e
-
SSDEEP
3072:KrfdSNN+V4Ji4GpMs/BE9PxGW5EdCeUsBRDFY9wIyZu9CwNwrGlXTDFarXEM2KPK:KE+VSuye7dCesaM7sqgrUgPOepQfX8A
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" winmgr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" winmgr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winmgr.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe -
Sality family
-
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winmgr.exe -
Windows security bypass 2 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winmgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winmgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" winmgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winmgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winmgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winmgr.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" winmgr.exe -
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
pid Process 2664 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 580 winmgr.exe 1688 winmgr.exe -
Loads dropped DLL 3 IoCs
pid Process 592 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 592 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 580 winmgr.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc winmgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" winmgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winmgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winmgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" winmgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winmgr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50509529509275084208452680240430\\winmgr.exe" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Manager = "C:\\Windows\\M-50509529509275084208452680240430\\winmgr.exe" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winmgr.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMEPADSV.EXE winmgr.exe File opened for modification C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe File created C:\Windows\SysWOW64\IME\shared\IMCCPHR.exe winmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2988 set thread context of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 580 set thread context of 1688 580 winmgr.exe 34 -
resource yara_rule behavioral1/memory/2988-3-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-5-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-1-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-4-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-10-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-8-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-6-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-11-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-9-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-7-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-50-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-13-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/2988-12-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/580-73-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx behavioral1/memory/580-82-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx behavioral1/memory/580-83-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx behavioral1/memory/580-76-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx behavioral1/memory/580-77-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx behavioral1/memory/580-78-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx behavioral1/memory/580-80-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx behavioral1/memory/580-84-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx behavioral1/memory/580-75-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx behavioral1/memory/580-81-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx behavioral1/memory/580-79-0x0000000001DA0000-0x0000000002E2E000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\M-50509529509275084208452680240430\winmgr.exe 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe File opened for modification C:\Windows\M-50509529509275084208452680240430 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe File opened for modification C:\Windows\SYSTEM.INI 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe File created C:\Windows\M-50509529509275084208452680240430\winmgr.exe 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winmgr.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 580 winmgr.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe Token: SeDebugPrivilege 580 winmgr.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1128 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 19 PID 2988 wrote to memory of 1176 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 20 PID 2988 wrote to memory of 1204 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 21 PID 2988 wrote to memory of 1308 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 23 PID 2988 wrote to memory of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 2988 wrote to memory of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 2988 wrote to memory of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 2988 wrote to memory of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 2988 wrote to memory of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 2988 wrote to memory of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 2988 wrote to memory of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 2988 wrote to memory of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 2988 wrote to memory of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 2988 wrote to memory of 592 2988 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 30 PID 592 wrote to memory of 2664 592 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 31 PID 592 wrote to memory of 2664 592 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 31 PID 592 wrote to memory of 2664 592 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 31 PID 592 wrote to memory of 2664 592 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 31 PID 592 wrote to memory of 580 592 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 33 PID 592 wrote to memory of 580 592 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 33 PID 592 wrote to memory of 580 592 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 33 PID 592 wrote to memory of 580 592 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe 33 PID 580 wrote to memory of 1128 580 winmgr.exe 19 PID 580 wrote to memory of 1176 580 winmgr.exe 20 PID 580 wrote to memory of 1204 580 winmgr.exe 21 PID 580 wrote to memory of 1308 580 winmgr.exe 23 PID 580 wrote to memory of 1688 580 winmgr.exe 34 PID 580 wrote to memory of 1688 580 winmgr.exe 34 PID 580 wrote to memory of 1688 580 winmgr.exe 34 PID 580 wrote to memory of 1688 580 winmgr.exe 34 PID 580 wrote to memory of 1688 580 winmgr.exe 34 PID 580 wrote to memory of 1688 580 winmgr.exe 34 PID 580 wrote to memory of 1688 580 winmgr.exe 34 PID 580 wrote to memory of 1688 580 winmgr.exe 34 PID 580 wrote to memory of 1688 580 winmgr.exe 34 PID 580 wrote to memory of 1688 580 winmgr.exe 34 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winmgr.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-01_8e0a909a89438175faf2ac7acf5e721b_magniber.exe"3⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ssqqfftmyy.bat" "4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\M-50509529509275084208452680240430\winmgr.exeC:\Windows\M-50509529509275084208452680240430\winmgr.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:580 -
C:\Windows\M-50509529509275084208452680240430\winmgr.exeC:\Windows\M-50509529509275084208452680240430\winmgr.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1688
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
278B
MD5bed4b032a789fb60d057170cab521091
SHA16024ec0a8f203064c1e097b07048d13b740e6df7
SHA256a4ea4cb0eeec58c40bbcddbd0a3eeedb1bcf7334f6c222f737ca12b13303a6f6
SHA512a5473d5dadc2f4434484d7d225711be59d492c74ccd252b3f484909ca8615d0b236f2504b546c6082a6771f1fa551fa6208f70b820c6e1b8efb71dcedcd304e1
-
Filesize
357KB
MD58e0a909a89438175faf2ac7acf5e721b
SHA10ac18576c7634bdc07ef0576c38df8036a806c0b
SHA25691a543a24299a0dc22fbec348d090c4a0774f822440f58965ff38da77b82f0e0
SHA51215201efc7fd47c5f3c3d6ec108f2eaf970102e411014a59eaefe17cdd6011fd632310b9e86c1b7a611467bd598b3ca89cb379935f23b3ca7337ca678e232c23e
-
Filesize
257B
MD5f7f352495bd7ad0086b311ebcad7ba20
SHA1b2bf1fe3eafadbd1d4085d2c40dc6aaf12f2c8f1
SHA256d4b701ce4790b04c787e40e6296f326e5eb37a805091b75a91ad0ebb95d2def0
SHA5128bc30b40d7937544e85925e7268b88384f50bd8bb33cd187aad1c8335671607019f891bf8e6ba482bb843077d95f99cb0fd29d8ccea34e6404c19bde62a0e9a4