Analysis

  • max time kernel
    29s
  • max time network
    28s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2023 04:29

General

  • Target

    fb3f2b0636c7f9e8913fb5ff593c38ed261473bc1a2f8fb0860dce82ecaf5e06.msi

  • Size

    10.6MB

  • MD5

    2eb29d721fbee14edbf2ad8f60336ebf

  • SHA1

    e1aada3863d929f9674597ebb595dc84bac7263e

  • SHA256

    fb3f2b0636c7f9e8913fb5ff593c38ed261473bc1a2f8fb0860dce82ecaf5e06

  • SHA512

    4161c8c76b085963b9557ecd38e3a379255a3c9aa16391f3bce4c2f60522b9d726ebc7fab1e0eec430422504105c04e0efc3a3f3af8d92b353aa7d2173ccdf92

  • SSDEEP

    1536:3RGjMkF2VAv21tCHDca26KfpD15sy7o/D6Ds0Ds7d:QJAAvatCHDaF515V7iDL

Score
10/10

Malware Config

Signatures

  • Detect magniber ransomware 2 IoCs
  • Magniber Ransomware

    Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fb3f2b0636c7f9e8913fb5ff593c38ed261473bc1a2f8fb0860dce82ecaf5e06.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5040
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4580
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 17202D19EB3A412AE3D71AD6061CA331
        2⤵
          PID:2760
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:4272
      • C:\Windows\system32\regsvr32.exe
        regsvr32.exe scrobj.dll /s /u /n /i:../../../Users/Public/zlujw06rvtx
        1⤵
          PID:1976
        • C:\Windows\system32\regsvr32.exe
          regsvr32.exe scrobj.dll /s /u /n /i:../../../Users/Public/zlujw06rvtx
          1⤵
            PID:3380

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\Installer\MSIF300.tmp

            Filesize

            164KB

            MD5

            58cbb401a11d8c1dffeafb2912f19dba

            SHA1

            eab721fe6fbf50cdf108ed9293b2aabf8cd26603

            SHA256

            373c717d2f44a4b7dffaebad38955b0a9403b4123c03fb58510c5976cc6b918a

            SHA512

            2c7bb343576d05f2a85bf0309ce163dc35789e477ad35c0069516658eb2aa791f48b54b2fcae956a5fd59c13501feae594277c3bef6a0f016facbd27910e1aa9

          • C:\Windows\Installer\MSIF300.tmp

            Filesize

            164KB

            MD5

            58cbb401a11d8c1dffeafb2912f19dba

            SHA1

            eab721fe6fbf50cdf108ed9293b2aabf8cd26603

            SHA256

            373c717d2f44a4b7dffaebad38955b0a9403b4123c03fb58510c5976cc6b918a

            SHA512

            2c7bb343576d05f2a85bf0309ce163dc35789e477ad35c0069516658eb2aa791f48b54b2fcae956a5fd59c13501feae594277c3bef6a0f016facbd27910e1aa9

          • memory/2480-144-0x000002BF4B680000-0x000002BF4B68C000-memory.dmp

            Filesize

            48KB

          • memory/2584-158-0x00000175DEFA0000-0x00000175DEFA4000-memory.dmp

            Filesize

            16KB