Analysis
-
max time kernel
124s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 15:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe
Resource
win7-20240508-en
General
-
Target
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe
-
Size
2.9MB
-
MD5
a929042a85c0ebe291a1b2b55f948567
-
SHA1
1211f45dc01988f0ba2f63b13e197af6e27603be
-
SHA256
e77d8392c09e6c1a42337f0079967c879bbf933358436a38791e4014f3ebfd7b
-
SHA512
1e9d36cb684d9d4b6be8efb02a30bf020d3661b6718ab3bcfbb62d9a2c0cedc9d37197443aad00a7a6db340a6cdebe268f1b5341282777ee2a2790d0f1417a2a
-
SSDEEP
49152:VpAJ4K/kZCRW6JIAYtBRVXJT8IE+eDvkX6uPh0OR8/dJ388mS5vbv+fH2rJnLs5V:gdkyIAYt3VXNeTkquPhO881Vv5LndS
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 38 IoCs
Processes:
resource yara_rule behavioral2/memory/4128-1-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-4-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-5-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-14-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-13-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-20-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-19-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-6-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-12-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-3-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-22-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-21-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-23-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-24-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-25-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-27-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-28-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-29-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-31-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-32-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-34-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-36-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-39-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-41-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-44-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-46-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-47-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-50-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-52-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-53-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-55-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-57-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-64-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-66-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-68-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-70-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-71-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4128-76-0x0000000002600000-0x00000000036BA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 38 IoCs
Processes:
resource yara_rule behavioral2/memory/4128-1-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-4-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-5-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-14-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-13-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-20-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-19-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-6-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-12-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-3-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-22-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-21-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-23-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-24-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-25-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-27-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-28-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-29-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-31-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-32-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-34-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-36-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-39-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-41-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-44-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-46-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-47-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-50-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-52-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-53-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-55-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-57-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-64-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-66-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-68-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-70-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-71-0x0000000002600000-0x00000000036BA000-memory.dmp UPX behavioral2/memory/4128-76-0x0000000002600000-0x00000000036BA000-memory.dmp UPX -
Processes:
resource yara_rule behavioral2/memory/4128-1-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-4-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-5-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-14-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-13-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-20-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-19-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-6-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-12-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-3-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-22-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-21-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-23-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-24-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-25-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-27-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-28-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-29-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-31-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-32-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-34-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-36-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-39-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-41-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-44-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-46-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-47-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-50-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-52-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-53-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-55-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-57-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-64-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-66-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-68-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-70-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-71-0x0000000002600000-0x00000000036BA000-memory.dmp upx behavioral2/memory/4128-76-0x0000000002600000-0x00000000036BA000-memory.dmp upx -
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process File opened (read-only) \??\E: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\Y: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\Z: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\I: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\M: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\P: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\R: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\T: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\V: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\G: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\H: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\J: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\N: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\U: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\W: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\K: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\L: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\O: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\Q: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\S: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened (read-only) \??\X: 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process File opened for modification \??\PhysicalDrive0 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process File opened for modification F:\autorun.inf 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\autorun.inf 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Drops file in Program Files directory 12 IoCs
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Drops file in Windows directory 2 IoCs
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process File created C:\Windows\e57322c 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe File opened for modification C:\Windows\SYSTEM.INI 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exepid process 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription pid process Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Token: SeDebugPrivilege 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription pid process target process PID 4128 wrote to memory of 772 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe fontdrvhost.exe PID 4128 wrote to memory of 776 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe fontdrvhost.exe PID 4128 wrote to memory of 332 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe dwm.exe PID 4128 wrote to memory of 2916 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe sihost.exe PID 4128 wrote to memory of 2940 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe svchost.exe PID 4128 wrote to memory of 2244 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe taskhostw.exe PID 4128 wrote to memory of 3432 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Explorer.EXE PID 4128 wrote to memory of 3532 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe svchost.exe PID 4128 wrote to memory of 3736 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe DllHost.exe PID 4128 wrote to memory of 3832 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe StartMenuExperienceHost.exe PID 4128 wrote to memory of 3892 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 3988 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe SearchApp.exe PID 4128 wrote to memory of 3568 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 2632 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe TextInputHost.exe PID 4128 wrote to memory of 3052 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 4704 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe backgroundTaskHost.exe PID 4128 wrote to memory of 4728 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe backgroundTaskHost.exe PID 4128 wrote to memory of 772 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe fontdrvhost.exe PID 4128 wrote to memory of 776 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe fontdrvhost.exe PID 4128 wrote to memory of 332 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe dwm.exe PID 4128 wrote to memory of 2916 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe sihost.exe PID 4128 wrote to memory of 2940 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe svchost.exe PID 4128 wrote to memory of 2244 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe taskhostw.exe PID 4128 wrote to memory of 3432 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Explorer.EXE PID 4128 wrote to memory of 3532 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe svchost.exe PID 4128 wrote to memory of 3736 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe DllHost.exe PID 4128 wrote to memory of 3832 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe StartMenuExperienceHost.exe PID 4128 wrote to memory of 3892 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 3988 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe SearchApp.exe PID 4128 wrote to memory of 3568 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 2632 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe TextInputHost.exe PID 4128 wrote to memory of 3052 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 4704 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe backgroundTaskHost.exe PID 4128 wrote to memory of 4824 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 4408 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 772 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe fontdrvhost.exe PID 4128 wrote to memory of 776 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe fontdrvhost.exe PID 4128 wrote to memory of 332 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe dwm.exe PID 4128 wrote to memory of 2916 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe sihost.exe PID 4128 wrote to memory of 2940 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe svchost.exe PID 4128 wrote to memory of 2244 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe taskhostw.exe PID 4128 wrote to memory of 3432 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Explorer.EXE PID 4128 wrote to memory of 3532 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe svchost.exe PID 4128 wrote to memory of 3736 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe DllHost.exe PID 4128 wrote to memory of 3832 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe StartMenuExperienceHost.exe PID 4128 wrote to memory of 3892 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 3988 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe SearchApp.exe PID 4128 wrote to memory of 3568 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 2632 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe TextInputHost.exe PID 4128 wrote to memory of 3052 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 4704 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe backgroundTaskHost.exe PID 4128 wrote to memory of 4824 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 4408 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe PID 4128 wrote to memory of 772 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe fontdrvhost.exe PID 4128 wrote to memory of 776 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe fontdrvhost.exe PID 4128 wrote to memory of 332 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe dwm.exe PID 4128 wrote to memory of 2916 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe sihost.exe PID 4128 wrote to memory of 2940 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe svchost.exe PID 4128 wrote to memory of 2244 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe taskhostw.exe PID 4128 wrote to memory of 3432 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe Explorer.EXE PID 4128 wrote to memory of 3532 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe svchost.exe PID 4128 wrote to memory of 3736 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe DllHost.exe PID 4128 wrote to memory of 3832 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe StartMenuExperienceHost.exe PID 4128 wrote to memory of 3892 4128 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe RuntimeBroker.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-30_a929042a85c0ebe291a1b2b55f948567_magniber.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\ctcm.exeFilesize
97KB
MD58f948bc0137a1bd1c815550872e08f49
SHA1b774c84d0c237b27563658238568879118a47149
SHA256376b59faea9bfa6323d37a6b54b1f3cbb396d3c04f819b25abd684759632f12c
SHA512139b641771a427c20032e17b37434d8ebc674b7ae0feee0ed47e18c1e69cb0751cc1451e980f0e0275ad29c1c40cee40703c243f76a4ac39b32e5f72ec0438f4
-
memory/4128-29-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-17-0x0000000004440000-0x0000000004442000-memory.dmpFilesize
8KB
-
memory/4128-5-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-1-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-18-0x0000000004440000-0x0000000004442000-memory.dmpFilesize
8KB
-
memory/4128-14-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-13-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-20-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-19-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-6-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-28-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-15-0x0000000004440000-0x0000000004442000-memory.dmpFilesize
8KB
-
memory/4128-31-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-3-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-22-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-21-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-23-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-24-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-25-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-27-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-16-0x0000000004590000-0x0000000004591000-memory.dmpFilesize
4KB
-
memory/4128-4-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-12-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-32-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-34-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-36-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-39-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-41-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-44-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-46-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-47-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-50-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-52-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-53-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-55-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-57-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-64-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-66-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-68-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-70-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-71-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-73-0x0000000004440000-0x0000000004442000-memory.dmpFilesize
8KB
-
memory/4128-76-0x0000000002600000-0x00000000036BA000-memory.dmpFilesize
16.7MB
-
memory/4128-0-0x0000000000400000-0x0000000000711000-memory.dmpFilesize
3.1MB