Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    29-06-2024 07:32

General

  • Target

    2024-06-29_c0193056ee5015d9e7abc4604af4479e_magniber.exe

  • Size

    12.2MB

  • MD5

    c0193056ee5015d9e7abc4604af4479e

  • SHA1

    5b6fea2f4227efc2f78b428550fbad3bebc1f0f5

  • SHA256

    77d02a47e39d16e4b5db548324419ddfe867b3d55e10973b69caeefacae981a7

  • SHA512

    5b836e0a0371301e52ac1f54f2f1fa98be2c8436675200859fa02f358e4019d2c25c0d754f2c7191df9abf45f3cb2e4b24e152e12094991ca7c11270283d1af7

  • SSDEEP

    196608:DPg2CWhGuZvjwQklner7/0S+6JfRbkebsN/cJ67DgKEl9sMvrrqNH2R7W:DYgGG7wFln+3fRb0V7El9s+rqNeW

Score
1/10

Malware Config

Signatures

  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-29_c0193056ee5015d9e7abc4604af4479e_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-29_c0193056ee5015d9e7abc4604af4479e_magniber.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2788

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    18b1a4de1315e54cf2fe9b7e8223c199

    SHA1

    277fd854a70dbfc783210e8f9e9fb6eef721e8c6

    SHA256

    feb9a8dba3c1fa0ed2114807c4bf56fb80612ee602b533b4518fa46835159a63

    SHA512

    c9f8a415661e58066183fb7966967c736fd6ff8cd5ed233a272976dfcd50684066e9cb8bbf8289f595d68ccb594eaba101f395c6253d6c98bafe7edf690259ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    52a4d72a56d2196c6a4e9bc145163c11

    SHA1

    95d43bcf65b1233998ff5950c8246c79d420bd79

    SHA256

    27a75c3a9300f0eabd21e14ca9897b205676e053dfa114ab7ca2a641b8dc38c1

    SHA512

    d6bb96a93592167d8884c496b08fe0801ad17fe593bad8f02e2e43b5a0c87571b9e3a775834256a5f5553ca8a549d8a4b269370267b53a287e55602c1de804cd

  • C:\Users\Admin\AppData\Local\Temp\Cab2A8C.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2B3A.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b