Analysis
-
max time kernel
2s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 15:56
Static task
static1
Behavioral task
behavioral1
Sample
649d1fcdc4529a221d916768edd5108a6a0172ab68fb3068b5248eae7d25143c.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
649d1fcdc4529a221d916768edd5108a6a0172ab68fb3068b5248eae7d25143c.dll
Resource
win10v2004-20230915-en
General
-
Target
649d1fcdc4529a221d916768edd5108a6a0172ab68fb3068b5248eae7d25143c.dll
-
Size
144KB
-
MD5
4e0b43fccdce8ac262a4c760f604a418
-
SHA1
fcfd2240283547cc436f2c6ee8c0d5c3b33b14bf
-
SHA256
649d1fcdc4529a221d916768edd5108a6a0172ab68fb3068b5248eae7d25143c
-
SHA512
25de71118b2d2b6111fc2a06e9b8774a3e8839d6b7f0576ea74377a2dd389a78ba225b4684f85efdd3dd48ce34d866fd38ade33642af6610ea41e3a8312556ea
-
SSDEEP
1536:NnYwKcxgp81CjMPdrvvXUH4+zNPq7csUEZUWv7EUxV1ZTTbifA47+rjB:NY0o4PRvvz+vV7M
Malware Config
Signatures
-
Detect magniber ransomware 2 IoCs
resource yara_rule behavioral2/memory/1132-1-0x000002326E300000-0x000002326E31A000-memory.dmp family_magniber behavioral2/memory/2732-0-0x000001CE7CF60000-0x000001CE7CF6A000-memory.dmp family_magniber -
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1132 rundll32.exe 1132 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1132 wrote to memory of 2732 1132 rundll32.exe 47 PID 1132 wrote to memory of 2828 1132 rundll32.exe 46 PID 1132 wrote to memory of 2940 1132 rundll32.exe 45 PID 1132 wrote to memory of 3156 1132 rundll32.exe 42 PID 1132 wrote to memory of 3288 1132 rundll32.exe 41 PID 1132 wrote to memory of 3464 1132 rundll32.exe 40 PID 1132 wrote to memory of 3656 1132 rundll32.exe 39
Processes
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3656
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3288
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3156
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\649d1fcdc4529a221d916768edd5108a6a0172ab68fb3068b5248eae7d25143c.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2828
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2732