Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-06-2022 14:11
Static task
static1
Behavioral task
behavioral1
Sample
Magniber14.msi
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Magniber14.msi
Resource
win10v2004-20220414-en
General
-
Target
Magniber14.msi
-
Size
11.4MB
-
MD5
578dcc9ab0d231ad315da3c568dd974a
-
SHA1
e690c686e225abbde34dbe4ff0e41bb2c93f3b53
-
SHA256
64a3d5a2d4e801efc34f17d2f32aaea3126b7f2dd9c3def16ebaa7a45486596b
-
SHA512
8a5e9476a25f4513ea047cb98a383c6b6208efa479841557eadc3fb037b024b6da40f4a18068f618a3a412bb8408b78870c26b530e95b749e3ceac84a2163bc2
Malware Config
Signatures
-
Detect magniber ransomware 2 IoCs
resource yara_rule behavioral2/memory/408-134-0x0000014C56BA0000-0x0000014C56BB4000-memory.dmp family_magniber behavioral2/memory/408-135-0x0000014C58EC0000-0x0000014C58ECA000-memory.dmp family_magniber -
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process 20 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5088 2052 bcdedit.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5056 2052 bcdedit.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8 2052 wbadmin.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3096 2052 wbadmin.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1488 2052 bcdedit.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2476 2052 bcdedit.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1920 2052 wbadmin.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2204 2052 wbadmin.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3856 2052 bcdedit.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4728 2052 bcdedit.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3256 2052 wbadmin.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 2052 wbadmin.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3652 2052 bcdedit.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2592 2052 bcdedit.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 2052 wbadmin.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1048 2052 wbadmin.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1556 2052 bcdedit.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 2052 bcdedit.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2516 2052 wbadmin.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1152 2052 wbadmin.exe 65 -
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
pid Process 5088 bcdedit.exe 5056 bcdedit.exe 1488 bcdedit.exe 2476 bcdedit.exe 3856 bcdedit.exe 4728 bcdedit.exe 3652 bcdedit.exe 2592 bcdedit.exe 1556 bcdedit.exe 2428 bcdedit.exe -
pid Process 3096 wbadmin.exe 1920 wbadmin.exe 3256 wbadmin.exe 1048 wbadmin.exe 1152 wbadmin.exe -
pid Process 8 wbadmin.exe 2204 wbadmin.exe 2068 wbadmin.exe 2084 wbadmin.exe 2516 wbadmin.exe -
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\BackupConnect.png => C:\Users\Admin\Pictures\BackupConnect.png.krkzauuz Explorer.EXE File renamed C:\Users\Admin\Pictures\GetConvert.tif => C:\Users\Admin\Pictures\GetConvert.tif.krkzauuz Explorer.EXE File renamed C:\Users\Admin\Pictures\SetSkip.png => C:\Users\Admin\Pictures\SetSkip.png.krkzauuz Explorer.EXE File renamed C:\Users\Admin\Pictures\SwitchConvertFrom.png => C:\Users\Admin\Pictures\SwitchConvertFrom.png.krkzauuz Explorer.EXE File renamed C:\Users\Admin\Pictures\ReadSubmit.crw => C:\Users\Admin\Pictures\ReadSubmit.crw.krkzauuz Explorer.EXE File renamed C:\Users\Admin\Pictures\StepWatch.crw => C:\Users\Admin\Pictures\StepWatch.crw.krkzauuz Explorer.EXE File renamed C:\Users\Admin\Pictures\SubmitTrace.crw => C:\Users\Admin\Pictures\SubmitTrace.crw.krkzauuz Explorer.EXE File renamed C:\Users\Admin\Pictures\LimitSwitch.crw => C:\Users\Admin\Pictures\LimitSwitch.crw.krkzauuz Explorer.EXE File renamed C:\Users\Admin\Pictures\SaveConvert.png => C:\Users\Admin\Pictures\SaveConvert.png.krkzauuz Explorer.EXE -
Loads dropped DLL 1 IoCs
pid Process 408 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e581e41.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI1FB8.tmp msiexec.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File created C:\Windows\Installer\e581e41.msi msiexec.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2568 3256 WerFault.exe 56 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000005a4eb8c89d443e990000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff0000000027010100000800005a4eb8c80000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3f000000ffffffff0000000007000100006809005a4eb8c8000000000000d0120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000005a4eb8c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000005a4eb8c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 vds.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript \\Users\\Public\\bqbpvcoufgj.vbe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer svchost.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript \\Users\\Public\\bqbpvcoufgj.vbe" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer svchost.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript \\Users\\Public\\bqbpvcoufgj.vbe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript \\Users\\Public\\bqbpvcoufgj.vbe" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute taskhostw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript \\Users\\Public\\bqbpvcoufgj.vbe" sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript \\Users\\Public\\bqbpvcoufgj.vbe" taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript \\Users\\Public\\bqbpvcoufgj.vbe" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" sihost.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute sihost.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings\CurVer sihost.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\ms-settings Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3452 msiexec.exe 3452 msiexec.exe 408 MsiExec.exe 408 MsiExec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2284 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3816 msiexec.exe Token: SeIncreaseQuotaPrivilege 3816 msiexec.exe Token: SeSecurityPrivilege 3452 msiexec.exe Token: SeCreateTokenPrivilege 3816 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3816 msiexec.exe Token: SeLockMemoryPrivilege 3816 msiexec.exe Token: SeIncreaseQuotaPrivilege 3816 msiexec.exe Token: SeMachineAccountPrivilege 3816 msiexec.exe Token: SeTcbPrivilege 3816 msiexec.exe Token: SeSecurityPrivilege 3816 msiexec.exe Token: SeTakeOwnershipPrivilege 3816 msiexec.exe Token: SeLoadDriverPrivilege 3816 msiexec.exe Token: SeSystemProfilePrivilege 3816 msiexec.exe Token: SeSystemtimePrivilege 3816 msiexec.exe Token: SeProfSingleProcessPrivilege 3816 msiexec.exe Token: SeIncBasePriorityPrivilege 3816 msiexec.exe Token: SeCreatePagefilePrivilege 3816 msiexec.exe Token: SeCreatePermanentPrivilege 3816 msiexec.exe Token: SeBackupPrivilege 3816 msiexec.exe Token: SeRestorePrivilege 3816 msiexec.exe Token: SeShutdownPrivilege 3816 msiexec.exe Token: SeDebugPrivilege 3816 msiexec.exe Token: SeAuditPrivilege 3816 msiexec.exe Token: SeSystemEnvironmentPrivilege 3816 msiexec.exe Token: SeChangeNotifyPrivilege 3816 msiexec.exe Token: SeRemoteShutdownPrivilege 3816 msiexec.exe Token: SeUndockPrivilege 3816 msiexec.exe Token: SeSyncAgentPrivilege 3816 msiexec.exe Token: SeEnableDelegationPrivilege 3816 msiexec.exe Token: SeManageVolumePrivilege 3816 msiexec.exe Token: SeImpersonatePrivilege 3816 msiexec.exe Token: SeCreateGlobalPrivilege 3816 msiexec.exe Token: SeBackupPrivilege 5012 vssvc.exe Token: SeRestorePrivilege 5012 vssvc.exe Token: SeAuditPrivilege 5012 vssvc.exe Token: SeBackupPrivilege 3452 msiexec.exe Token: SeRestorePrivilege 3452 msiexec.exe Token: SeRestorePrivilege 3452 msiexec.exe Token: SeTakeOwnershipPrivilege 3452 msiexec.exe Token: SeRestorePrivilege 3452 msiexec.exe Token: SeTakeOwnershipPrivilege 3452 msiexec.exe Token: SeShutdownPrivilege 2284 Explorer.EXE Token: SeCreatePagefilePrivilege 2284 Explorer.EXE Token: SeShutdownPrivilege 2284 Explorer.EXE Token: SeCreatePagefilePrivilege 2284 Explorer.EXE Token: SeShutdownPrivilege 2284 Explorer.EXE Token: SeCreatePagefilePrivilege 2284 Explorer.EXE Token: SeShutdownPrivilege 2284 Explorer.EXE Token: SeCreatePagefilePrivilege 2284 Explorer.EXE Token: SeShutdownPrivilege 2284 Explorer.EXE Token: SeCreatePagefilePrivilege 2284 Explorer.EXE Token: SeBackupPrivilege 4008 srtasks.exe Token: SeRestorePrivilege 4008 srtasks.exe Token: SeSecurityPrivilege 4008 srtasks.exe Token: SeTakeOwnershipPrivilege 4008 srtasks.exe Token: SeShutdownPrivilege 2284 Explorer.EXE Token: SeCreatePagefilePrivilege 2284 Explorer.EXE Token: SeBackupPrivilege 4008 srtasks.exe Token: SeRestorePrivilege 4008 srtasks.exe Token: SeSecurityPrivilege 4008 srtasks.exe Token: SeTakeOwnershipPrivilege 4008 srtasks.exe Token: SeShutdownPrivilege 2284 Explorer.EXE Token: SeCreatePagefilePrivilege 2284 Explorer.EXE Token: SeShutdownPrivilege 2284 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3816 msiexec.exe 3816 msiexec.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4008 3452 msiexec.exe 92 PID 3452 wrote to memory of 4008 3452 msiexec.exe 92 PID 3452 wrote to memory of 408 3452 msiexec.exe 94 PID 3452 wrote to memory of 408 3452 msiexec.exe 94 PID 408 wrote to memory of 2388 408 MsiExec.exe 40 PID 408 wrote to memory of 2416 408 MsiExec.exe 44 PID 408 wrote to memory of 2644 408 MsiExec.exe 48 PID 408 wrote to memory of 2284 408 MsiExec.exe 50 PID 408 wrote to memory of 2976 408 MsiExec.exe 51 PID 408 wrote to memory of 3256 408 MsiExec.exe 56 PID 408 wrote to memory of 3356 408 MsiExec.exe 53 PID 408 wrote to memory of 3492 408 MsiExec.exe 55 PID 408 wrote to memory of 3572 408 MsiExec.exe 75 PID 408 wrote to memory of 3804 408 MsiExec.exe 74 PID 408 wrote to memory of 4020 408 MsiExec.exe 57 PID 408 wrote to memory of 3816 408 MsiExec.exe 79 PID 2672 wrote to memory of 1956 2672 cmd.exe 101 PID 2672 wrote to memory of 1956 2672 cmd.exe 101 PID 1956 wrote to memory of 1068 1956 fodhelper.exe 103 PID 1956 wrote to memory of 1068 1956 fodhelper.exe 103 PID 1820 wrote to memory of 2564 1820 cmd.exe 118 PID 1820 wrote to memory of 2564 1820 cmd.exe 118 PID 2564 wrote to memory of 5004 2564 fodhelper.exe 119 PID 2564 wrote to memory of 5004 2564 fodhelper.exe 119 PID 4652 wrote to memory of 3552 4652 cmd.exe 130 PID 4652 wrote to memory of 3552 4652 cmd.exe 130 PID 3552 wrote to memory of 3068 3552 fodhelper.exe 131 PID 3552 wrote to memory of 3068 3552 fodhelper.exe 131 PID 4392 wrote to memory of 1428 4392 cmd.exe 142 PID 4392 wrote to memory of 1428 4392 cmd.exe 142 PID 1428 wrote to memory of 3544 1428 fodhelper.exe 143 PID 1428 wrote to memory of 3544 1428 fodhelper.exe 143 PID 4540 wrote to memory of 2972 4540 cmd.exe 154 PID 4540 wrote to memory of 2972 4540 cmd.exe 154 PID 2972 wrote to memory of 1120 2972 fodhelper.exe 155 PID 2972 wrote to memory of 1120 2972 fodhelper.exe 155
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
PID:2388 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\wscript.exe"wscript.exe" \Users\Public\bqbpvcoufgj.vbe4⤵PID:1068
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
- Modifies registry class
PID:2416 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\system32\wscript.exe"wscript.exe" \Users\Public\bqbpvcoufgj.vbe4⤵PID:3544
-
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
- Modifies registry class
PID:2644
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies extensions of user files
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Magniber14.msi2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3816
-
-
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\system32\wscript.exe"wscript.exe" \Users\Public\bqbpvcoufgj.vbe4⤵PID:3068
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
- Modifies registry class
PID:2976
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3356
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3492
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3256
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3256 -s 9882⤵
- Program crash
PID:2568
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:4020 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\wscript.exe"wscript.exe" \Users\Public\bqbpvcoufgj.vbe4⤵PID:1120
-
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:3804 -
C:\Windows\System32\cmd.exe/c fodhelper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\System32\fodhelper.exefodhelper.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\wscript.exe"wscript.exe" \Users\Public\bqbpvcoufgj.vbe4⤵PID:5004
-
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3572
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding E0A5418A245D8379F108A9193A2A88A22⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:408
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 3256 -ip 32561⤵PID:1832
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:5088
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:5056
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:8
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
- Drops file in Windows directory
PID:3096
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:4032
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3748
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:3980
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:1488
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:2476
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
PID:1920
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:2204
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:3856
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:4728
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
PID:3256
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:2068
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:3652
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:2592
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:2084
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
PID:1048
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:1556
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no1⤵
- Process spawned unexpected child process
- Modifies boot configuration data using bcdedit
PID:2428
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet1⤵
- Process spawned unexpected child process
- Deletes backup catalog
PID:2516
-
C:\Windows\system32\wbadmin.exewbadmin delete systemstatebackup -quiet1⤵
- Process spawned unexpected child process
- Deletes System State backups
PID:1152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
862B
MD58c6010b5f4a5f819f36fa9a4179cf583
SHA17e5e759f3a8593c7be0dcfa97538308c0f5f1709
SHA2569b7671b16d1b0018f87660d32ed492d3d774867297951fd6aad01ec444f2da05
SHA512098b19fb177741a49f4778ddcf63c656be644da137aeb97b48049664ac6a50a26cb49e911d0a822412c40ed08a35c875323568fb14f6e7358d2b6b0bb6ef61cf
-
Filesize
862B
MD58c6010b5f4a5f819f36fa9a4179cf583
SHA17e5e759f3a8593c7be0dcfa97538308c0f5f1709
SHA2569b7671b16d1b0018f87660d32ed492d3d774867297951fd6aad01ec444f2da05
SHA512098b19fb177741a49f4778ddcf63c656be644da137aeb97b48049664ac6a50a26cb49e911d0a822412c40ed08a35c875323568fb14f6e7358d2b6b0bb6ef61cf
-
Filesize
862B
MD58c6010b5f4a5f819f36fa9a4179cf583
SHA17e5e759f3a8593c7be0dcfa97538308c0f5f1709
SHA2569b7671b16d1b0018f87660d32ed492d3d774867297951fd6aad01ec444f2da05
SHA512098b19fb177741a49f4778ddcf63c656be644da137aeb97b48049664ac6a50a26cb49e911d0a822412c40ed08a35c875323568fb14f6e7358d2b6b0bb6ef61cf
-
Filesize
862B
MD58c6010b5f4a5f819f36fa9a4179cf583
SHA17e5e759f3a8593c7be0dcfa97538308c0f5f1709
SHA2569b7671b16d1b0018f87660d32ed492d3d774867297951fd6aad01ec444f2da05
SHA512098b19fb177741a49f4778ddcf63c656be644da137aeb97b48049664ac6a50a26cb49e911d0a822412c40ed08a35c875323568fb14f6e7358d2b6b0bb6ef61cf
-
Filesize
862B
MD58c6010b5f4a5f819f36fa9a4179cf583
SHA17e5e759f3a8593c7be0dcfa97538308c0f5f1709
SHA2569b7671b16d1b0018f87660d32ed492d3d774867297951fd6aad01ec444f2da05
SHA512098b19fb177741a49f4778ddcf63c656be644da137aeb97b48049664ac6a50a26cb49e911d0a822412c40ed08a35c875323568fb14f6e7358d2b6b0bb6ef61cf
-
Filesize
99KB
MD56e2b8071887c4662bb95923b7c14acf7
SHA13e186c237a37987037b96bd32761b58c56238c7d
SHA2562f6e10671dd552e2adfad918f363c76a08de7baa6df381af7c441d4ec10f4ffb
SHA5120c2e90416abd56296430b8b631bd2c2608e122203cec44158353897c56922fff82c4574377ef5ece8b9b2609fe2d7b5355acd2e6f74df159d61eaea5882fbf4d
-
Filesize
99KB
MD56e2b8071887c4662bb95923b7c14acf7
SHA13e186c237a37987037b96bd32761b58c56238c7d
SHA2562f6e10671dd552e2adfad918f363c76a08de7baa6df381af7c441d4ec10f4ffb
SHA5120c2e90416abd56296430b8b631bd2c2608e122203cec44158353897c56922fff82c4574377ef5ece8b9b2609fe2d7b5355acd2e6f74df159d61eaea5882fbf4d
-
Filesize
23.0MB
MD5287cf286685f21e65578f9358fd417f9
SHA12e86c4afc0ea9cf781aa6d4a0af3922c947b802d
SHA2562c5b1347829622ca382933dd789cf52467221b89649b3df783efcd108ccb3306
SHA5126749a49dd8f01ea73a447a519984396efcd6a92e2c37920e53fe03b7833f5aedc83f8171b5be21f1176ace5cbd0b7783450b19703edf08c727304cab8e25bff3
-
\??\Volume{c8b84e5a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{bf3ec9d7-87d4-4c37-b04b-0745f1381d7b}_OnDiskSnapshotProp
Filesize5KB
MD5c4ef064004053082449128b24ec1f0d8
SHA18fdd4d6cac9c9653f12267c4b5ddbea86897914b
SHA256edd2c03d4a20e655a9f89ca5515906a1d683959555fe5232e2fc8e294522870c
SHA512714b30823de2cff86cd3692cf79240c7c192ee018257fb876e887b449bf81d2389b23e34623441c830bc41e5c82540856b1946ff925a95ce38cd49a338875759