Resubmissions
03-04-2023 01:32
230403-bx8l2add8y 10Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 01:32
Static task
static1
Behavioral task
behavioral1
Sample
magniber.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
magniber.js
Resource
win10v2004-20230220-en
General
-
Target
magniber.js
-
Size
212KB
-
MD5
6a76eeb61c3f44ae8d61bbddc9b1f58e
-
SHA1
25ade112e1930ed4ca7501c0ab2944cb25738478
-
SHA256
12921c2d0578f9d83ada9dfc4eb362ba5258d44e07741fcce87fdd91118d7cd2
-
SHA512
a1b753cce043ee06b5b7520f4a46cc7fc704870d9d2ed9c7285bb2a4084a3075dff4c95ba369480dc5b9536ed2636bb856e4ac4e097322cb09b625260f13f518
-
SSDEEP
1536:rcVvZx6Nl+Ywq8zNNR6E4JrLZ8hsnUKMkQcIntkov/VJH8Uq0is6EHqUXnxA+ETK:t25gfhe7
Malware Config
Signatures
-
Detect magniber ransomware 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2404-137-0x000001CE44C50000-0x000001CE44C5A000-memory.dmp family_magniber -
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\RestoreOpen.tiff svchost.exe File opened for modification C:\Users\Admin\Pictures\UnblockRevoke.tiff svchost.exe File renamed C:\Users\Admin\Pictures\UnblockRevoke.tiff => C:\Users\Admin\Pictures\UnblockRevoke.tiff.xqjrmwj svchost.exe File renamed C:\Users\Admin\Pictures\ConvertFromCompress.crw => C:\Users\Admin\Pictures\ConvertFromCompress.crw.xqjrmwj svchost.exe File renamed C:\Users\Admin\Pictures\ResumeConvertTo.raw => C:\Users\Admin\Pictures\ResumeConvertTo.raw.xqjrmwj svchost.exe File opened for modification C:\Users\Admin\Pictures\CompleteRepair.tiff svchost.exe File renamed C:\Users\Admin\Pictures\CompleteRepair.tiff => C:\Users\Admin\Pictures\CompleteRepair.tiff.xqjrmwj svchost.exe File renamed C:\Users\Admin\Pictures\StepSave.tif => C:\Users\Admin\Pictures\StepSave.tif.xqjrmwj svchost.exe File renamed C:\Users\Admin\Pictures\RestoreOpen.tiff => C:\Users\Admin\Pictures\RestoreOpen.tiff.xqjrmwj svchost.exe File renamed C:\Users\Admin\Pictures\SkipConvertTo.png => C:\Users\Admin\Pictures\SkipConvertTo.png.xqjrmwj svchost.exe File renamed C:\Users\Admin\Pictures\SplitUnprotect.tif => C:\Users\Admin\Pictures\SplitUnprotect.tif.xqjrmwj svchost.exe File renamed C:\Users\Admin\Pictures\StartBlock.png => C:\Users\Admin\Pictures\StartBlock.png.xqjrmwj svchost.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 936 3480 WerFault.exe DllHost.exe -
Modifies registry class 37 IoCs
Processes:
svchost.exeExplorer.EXEsvchost.exesihost.exeRuntimeBroker.exeRuntimeBroker.exetaskhostw.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute svchost.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/hqrmpiae.kpg" sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/skwtctyu.kpg" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/xmalwzfcen.kpg" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/dcvnwlgarn.kpg" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" sihost.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/xoaqtabsamrn.kpg" taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings sihost.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer sihost.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/vgbwjj.kpg" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\ = "wscript.exe /B /E:VBScript.Encode ../../Users/Public/ufnydhqolalt.kpg" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\AppX0enk2acdsmv8ydhntbtea6yjp27223q6\Shell\open\command\DelegateExecute Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" taskhostw.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\ms-settings\CurVer\ = "AppX0enk2acdsmv8ydhntbtea6yjp27223q6" RuntimeBroker.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
wscript.exepid process 1248 wscript.exe 1248 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3076 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
Explorer.EXERuntimeBroker.exedescription pid process Token: SeShutdownPrivilege 3076 Explorer.EXE Token: SeCreatePagefilePrivilege 3076 Explorer.EXE Token: SeShutdownPrivilege 3076 Explorer.EXE Token: SeCreatePagefilePrivilege 3076 Explorer.EXE Token: SeShutdownPrivilege 3076 Explorer.EXE Token: SeCreatePagefilePrivilege 3076 Explorer.EXE Token: SeShutdownPrivilege 3076 Explorer.EXE Token: SeCreatePagefilePrivilege 3076 Explorer.EXE Token: SeShutdownPrivilege 3716 RuntimeBroker.exe Token: SeShutdownPrivilege 3716 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
wscript.exedescription pid process target process PID 1248 wrote to memory of 2404 1248 wscript.exe sihost.exe PID 1248 wrote to memory of 2436 1248 wscript.exe svchost.exe PID 1248 wrote to memory of 2536 1248 wscript.exe taskhostw.exe PID 1248 wrote to memory of 3076 1248 wscript.exe Explorer.EXE PID 1248 wrote to memory of 3256 1248 wscript.exe svchost.exe PID 1248 wrote to memory of 3480 1248 wscript.exe DllHost.exe PID 1248 wrote to memory of 3644 1248 wscript.exe StartMenuExperienceHost.exe PID 1248 wrote to memory of 3716 1248 wscript.exe RuntimeBroker.exe PID 1248 wrote to memory of 3808 1248 wscript.exe SearchApp.exe PID 1248 wrote to memory of 4044 1248 wscript.exe RuntimeBroker.exe PID 1248 wrote to memory of 2052 1248 wscript.exe backgroundTaskHost.exe PID 1248 wrote to memory of 4344 1248 wscript.exe backgroundTaskHost.exe
Processes
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3808
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:4044
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:2052
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4344
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3644
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3480
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3480 -s 9522⤵
- Program crash
PID:936
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
- Modifies registry class
PID:3256
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3076 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\magniber.js2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
- Modifies registry class
PID:2536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
- Modifies extensions of user files
- Modifies registry class
PID:2436
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
PID:2404
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 3480 -ip 34801⤵PID:1992
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD58c416822a24557841bc490aadf8ddb69
SHA1b3821ed8664ee4d2bcd38ca77106982a3c6f2c96
SHA256c7cc4c8f7353225a45f3bf42dcd6e76cd2018f0d5dcc652345a1b46170adc977
SHA512d4423b895b442aa85e96e105f26b12dfae6aae254bb8d60272aa9a19f9582522ab94566a1e481918b7395bb1db140a258bf09484fecce6a5f6cd1cfed92baeef
-
Filesize
879B
MD5d3272865d96aca9d876b2abb975ec6fb
SHA1e93d935ff3e185e50ee9524d64977e778a1ac0aa
SHA256f08930a65b91fc6025b66a64c9ca3aca4a74f8e1e770c17c56dbe76762625901
SHA512e4622ccc72e1fa34e2fd0d03c9ad1190d29ed0f1b62de9c6331000abdb7f88adb23d54d7bdd2cdd9854f7bb197a07165f4c2c4d2d9c51205ea005a5277c7c89a