Analysis

  • max time kernel
    300s
  • max time network
    229s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2022 02:31

General

  • Target

    bba85d79db69db1b638e24e0a426ccccdc5c95875b8c3a26aa959cce3f6c8575.jse

  • Size

    167KB

  • MD5

    a1f5a11ee4b1ae01ea986311bdc9a840

  • SHA1

    0aacc589c57adba17786cbfa4446e6ce1ae48d2e

  • SHA256

    bba85d79db69db1b638e24e0a426ccccdc5c95875b8c3a26aa959cce3f6c8575

  • SHA512

    ce8db2d1da1f446df13ac6bc12a76d78b5578f787e0b24dccca4ebc7bb941e5d27336321c6338957fc198e92669345d95298b3fbaeca6e604666ee44d5f108f9

  • SSDEEP

    3072:fHsGPsk+UsSlORiat8x8S4k1sZa7GGCcxaeQR3ReRw/H3MrqW25pf5w2D:fPsk+UjlOR1t8n1sGVCcxbQm28O5wo

Malware Config

Signatures

  • Detect magniber ransomware 3 IoCs
  • Magniber Ransomware

    Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

  • Process spawned unexpected child process 8 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
  • Deletes System State backups 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Deletes backup catalog 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops file in Windows directory 3 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
      PID:3500
    • C:\Windows\system32\backgroundTaskHost.exe
      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
      1⤵
        PID:4000
      • C:\Windows\system32\backgroundTaskHost.exe
        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
        1⤵
          PID:680
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
          • Modifies registry class
          PID:4708
          • C:\Windows\System32\cmd.exe
            /c fodhelper.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1648
            • C:\Windows\System32\fodhelper.exe
              fodhelper.exe
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3428
              • C:\Windows\system32\wscript.exe
                "wscript.exe" /B /E:VBScript.Encode ../../Users/Public/lmxtgq.jfif
                4⤵
                  PID:4996
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
            • Modifies registry class
            PID:3712
            • C:\Windows\System32\cmd.exe
              /c fodhelper.exe
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4256
              • C:\Windows\System32\fodhelper.exe
                fodhelper.exe
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4440
                • C:\Windows\system32\wscript.exe
                  "wscript.exe" /B /E:VBScript.Encode ../../Users/Public/lmxtgq.jfif
                  4⤵
                    PID:1908
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              PID:3420
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3356
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                  PID:3252
                  • C:\Windows\system32\WerFault.exe
                    C:\Windows\system32\WerFault.exe -u -p 3252 -s 724
                    2⤵
                    • Program crash
                    PID:4232
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                  1⤵
                  • Modifies registry class
                  PID:2668
                • C:\Windows\Explorer.EXE
                  C:\Windows\Explorer.EXE
                  1⤵
                  • Modifies registry class
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:2220
                  • C:\Windows\System32\WScript.exe
                    C:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Temp\bba85d79db69db1b638e24e0a426ccccdc5c95875b8c3a26aa959cce3f6c8575.jse"
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:720
                  • C:\Windows\System32\cmd.exe
                    /c fodhelper.exe
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1524
                    • C:\Windows\System32\fodhelper.exe
                      fodhelper.exe
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4528
                      • C:\Windows\system32\wscript.exe
                        "wscript.exe" /B /E:VBScript.Encode ../../Users/Public/resgwgmblxu.jfif
                        4⤵
                          PID:4268
                  • C:\Windows\system32\taskhostw.exe
                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                    1⤵
                    • Modifies registry class
                    PID:2868
                    • C:\Windows\System32\cmd.exe
                      /c fodhelper.exe
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1388
                      • C:\Windows\System32\fodhelper.exe
                        fodhelper.exe
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2104
                        • C:\Windows\system32\wscript.exe
                          "wscript.exe" /B /E:VBScript.Encode ../../Users/Public/siymdoculzkg.jfif
                          4⤵
                            PID:2404
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                      1⤵
                      • Modifies registry class
                      PID:2648
                      • C:\Windows\System32\cmd.exe
                        /c fodhelper.exe
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3468
                        • C:\Windows\System32\fodhelper.exe
                          fodhelper.exe
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2600
                          • C:\Windows\system32\wscript.exe
                            "wscript.exe" /B /E:VBScript.Encode ../../Users/Public/niqskaqf.jfif
                            4⤵
                              PID:836
                      • C:\Windows\system32\sihost.exe
                        sihost.exe
                        1⤵
                        • Modifies extensions of user files
                        • Modifies registry class
                        PID:2500
                        • C:\Windows\System32\cmd.exe
                          /c fodhelper.exe
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:912
                          • C:\Windows\System32\fodhelper.exe
                            fodhelper.exe
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3100
                            • C:\Windows\system32\wscript.exe
                              "wscript.exe" /B /E:VBScript.Encode ../../Users/Public/resgwgmblxu.jfif
                              4⤵
                                PID:1576
                        • C:\Windows\System32\RuntimeBroker.exe
                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                          1⤵
                            PID:4472
                          • C:\Windows\system32\WerFault.exe
                            C:\Windows\system32\WerFault.exe -pss -s 448 -p 3252 -ip 3252
                            1⤵
                              PID:2244
                            • C:\Windows\system32\vssvc.exe
                              C:\Windows\system32\vssvc.exe
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1016
                            • C:\Windows\system32\bcdedit.exe
                              bcdedit /set {default} bootstatuspolicy ignoreallfailures
                              1⤵
                              • Process spawned unexpected child process
                              • Modifies boot configuration data using bcdedit
                              PID:2140
                            • C:\Windows\system32\bcdedit.exe
                              bcdedit /set {default} recoveryenabled no
                              1⤵
                              • Process spawned unexpected child process
                              • Modifies boot configuration data using bcdedit
                              PID:3296
                            • C:\Windows\system32\wbadmin.exe
                              wbadmin delete systemstatebackup -quiet
                              1⤵
                              • Process spawned unexpected child process
                              • Deletes System State backups
                              • Drops file in Windows directory
                              PID:4408
                            • C:\Windows\system32\wbadmin.exe
                              wbadmin delete catalog -quiet
                              1⤵
                              • Process spawned unexpected child process
                              • Deletes backup catalog
                              PID:344
                            • C:\Windows\system32\wbengine.exe
                              "C:\Windows\system32\wbengine.exe"
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:432
                            • C:\Windows\System32\vdsldr.exe
                              C:\Windows\System32\vdsldr.exe -Embedding
                              1⤵
                                PID:2924
                              • C:\Windows\System32\vds.exe
                                C:\Windows\System32\vds.exe
                                1⤵
                                • Checks SCSI registry key(s)
                                PID:4908
                              • C:\Windows\system32\bcdedit.exe
                                bcdedit /set {default} bootstatuspolicy ignoreallfailures
                                1⤵
                                • Process spawned unexpected child process
                                • Modifies boot configuration data using bcdedit
                                PID:1708
                              • C:\Windows\system32\bcdedit.exe
                                bcdedit /set {default} recoveryenabled no
                                1⤵
                                • Process spawned unexpected child process
                                • Modifies boot configuration data using bcdedit
                                PID:692
                              • C:\Windows\system32\wbadmin.exe
                                wbadmin delete catalog -quiet
                                1⤵
                                • Process spawned unexpected child process
                                • Deletes backup catalog
                                PID:4264
                              • C:\Windows\system32\wbadmin.exe
                                wbadmin delete systemstatebackup -quiet
                                1⤵
                                • Process spawned unexpected child process
                                • Deletes System State backups
                                PID:4824

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Public\lmxtgq.jfif

                                Filesize

                                876B

                                MD5

                                42efa7eac4c01a7ad942e23cafff35f6

                                SHA1

                                98c779c17c882d831fb24d43b6ddf2d1f2cb168f

                                SHA256

                                b0ff6c7ef7c2fd4a9037620d0e56e276480b9e2bf2b0bc44c878182adf3dbdc3

                                SHA512

                                b41b2cd6fe388ebf65aab8ec7b5b532a5dea73165741e17a016f63d7b6e136b4a67f10133f6cb9b44f4737cfaccc9d4f1239da7e9ac0caf5e9daf750a3612580

                              • C:\Users\Public\resgwgmblxu.jfif

                                Filesize

                                876B

                                MD5

                                42efa7eac4c01a7ad942e23cafff35f6

                                SHA1

                                98c779c17c882d831fb24d43b6ddf2d1f2cb168f

                                SHA256

                                b0ff6c7ef7c2fd4a9037620d0e56e276480b9e2bf2b0bc44c878182adf3dbdc3

                                SHA512

                                b41b2cd6fe388ebf65aab8ec7b5b532a5dea73165741e17a016f63d7b6e136b4a67f10133f6cb9b44f4737cfaccc9d4f1239da7e9ac0caf5e9daf750a3612580

                              • memory/720-133-0x00007FFCC3CB0000-0x00007FFCC4771000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/720-134-0x0000023E4C200000-0x0000023E4D200000-memory.dmp

                                Filesize

                                16.0MB

                              • memory/720-146-0x00007FFCC3CB0000-0x00007FFCC4771000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/720-148-0x0000023E4C200000-0x0000023E4D200000-memory.dmp

                                Filesize

                                16.0MB

                              • memory/720-151-0x00007FFCC3CB0000-0x00007FFCC4771000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2500-135-0x000002B34D7B0000-0x000002B34D7BA000-memory.dmp

                                Filesize

                                40KB