Analysis
-
max time kernel
49s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 16:56
Static task
static1
Behavioral task
behavioral1
Sample
SYSTEM.Critical.Upgrade.Win10.0.3328b853458d14.jse
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SYSTEM.Critical.Upgrade.Win10.0.3328b853458d14.jse
Resource
win10v2004-20220812-en
General
-
Target
SYSTEM.Critical.Upgrade.Win10.0.3328b853458d14.jse
-
Size
177KB
-
MD5
09eef16b2386f3c3026930d6e2cf4052
-
SHA1
52cb01541e9ffb62e8744fdd41c13bbeb5083aac
-
SHA256
5b6e931f07ac9d16237282dfb11bd76ae26cadd255a687c378f6b320cf231224
-
SHA512
10f444dc05b33612bfbfb684bb8b45fc18f963e2884947c3a94516d3111e33ca388dcf58a28434ff041fd7bc5ab78f889e766011a5cd54aae1f7fed1d3c203c6
-
SSDEEP
3072:9uACDasQAJWzjKoTVk/4wAn6YiUZPKlwQ/SBpkgxnl+Kvm25gfEb1J:9uzFJf/WXiUZSlHqBHlUKoEbX
Malware Config
Signatures
-
Detect magniber ransomware 1 IoCs
Processes:
resource yara_rule behavioral1/memory/900-55-0x0000000005341000-0x000000000534C000-memory.dmp family_magniber -
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid Process Token: 33 1752 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1752 AUDIODG.EXE Token: 33 1752 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1752 AUDIODG.EXE
Processes
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\Local\Temp\SYSTEM.Critical.Upgrade.Win10.0.3328b853458d14.jse"1⤵PID:900
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1988
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5781⤵
- Suspicious use of AdjustPrivilegeToken
PID:1752