Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 11:28

General

  • Target

    2024-06-27_543dc4d3a1cd50cb143ddf38ed549e47_magniber.exe

  • Size

    12.2MB

  • MD5

    543dc4d3a1cd50cb143ddf38ed549e47

  • SHA1

    de5021f6f95c56e90aad650f3cb35c0b69eda9ef

  • SHA256

    b608660bdeb043b1f930440a6e02ce6bcc0bbc974076b0589c8b4c669db6495d

  • SHA512

    0623a8d707786cae50438fea5b1f95e55d181bddbfe651a8daa1391ef88b0d4fc8692d80a2b71b387647454a1b26353f9d81b336e2f9925a78760d91261b1674

  • SSDEEP

    196608:/Pg2CWhGuZvjwQklner7/0S+6JfRbkebsN/cJ67DgKEl9sMvrrqNP2R7X:/YgGG7wFln+3fRb0V7El9s+rqNGX

Score
1/10

Malware Config

Signatures

  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-27_543dc4d3a1cd50cb143ddf38ed549e47_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-27_543dc4d3a1cd50cb143ddf38ed549e47_magniber.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2872

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a4fe2b485f595b411af1f47407bbb57d

    SHA1

    d56566a7912cd132fc4af0bfe09a6593b9d30839

    SHA256

    a03e706d85bfa841e77e1f91733553b432d35225dab77d4d549462253bf1b77b

    SHA512

    79fa58825670954a26146b1fc3b7236db3f80d2b9a0e7664be16dad4ef6dc399aa1f162f13cc7256210e06740a9c62f00a9e3ad3f94288f8e3f052b35ebcb1a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    85ca7c310f84f5b1280025c8c218bbeb

    SHA1

    5bca385236bab85e00d2eb03da44a37222ade452

    SHA256

    add0a86ac53c4c864c4960815c3e7033c4b10c7757e304abaa0488fb70b6819d

    SHA512

    9b18f685f7d0457bfb78965a82f3e2cd124426a6167431b7b4eeeab90da0c253a4b8f3adfe5e2c2ea1687e28454a239f16b7e868a7b9122ac542214831ce7aa2

  • C:\Users\Admin\AppData\Local\Temp\Cab1C1A.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1D1B.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b