Analysis

  • max time kernel
    1s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2023 09:39

General

  • Target

    06acd697bc0a41a6fa1098eba46ddd40d029a5fef3eb152fbf9d0d39e6f8673d.dll

  • Size

    38KB

  • MD5

    96d505aa061f15eff5b723ae3f82bc98

  • SHA1

    fadec5f3bd444044ec269334cfb1ee9fff41da12

  • SHA256

    06acd697bc0a41a6fa1098eba46ddd40d029a5fef3eb152fbf9d0d39e6f8673d

  • SHA512

    925fdeb3b7cdf337ac809cd2e35b8301020dd1c6f9da25754e2a0b762c2a4a187090777c97c26cd43fd93297f62b00c15593579eadd9cb72f187dc1793cf7ed0

  • SSDEEP

    768:biAFh5YBIKGMZmJ1/VTrzDSXl+h6AbUMP02Q3NYVdQDVMM:bT2nZoVTrzDSjVMEvWM

Score
10/10

Malware Config

Signatures

  • Detect magniber ransomware 2 IoCs
  • Magniber Ransomware

    Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2508
    • C:\Windows\system32\sihost.exe
      sihost.exe
      1⤵
        PID:2472
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\06acd697bc0a41a6fa1098eba46ddd40d029a5fef3eb152fbf9d0d39e6f8673d.dll,#1
        1⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:3824

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2472-12-0x0000024063B50000-0x0000024063B55000-memory.dmp

        Filesize

        20KB

      • memory/2472-13-0x0000024063B50000-0x0000024063B55000-memory.dmp

        Filesize

        20KB

      • memory/3824-6-0x00000251D4340000-0x00000251D4341000-memory.dmp

        Filesize

        4KB

      • memory/3824-3-0x00000251D4310000-0x00000251D4311000-memory.dmp

        Filesize

        4KB

      • memory/3824-5-0x00000251D4330000-0x00000251D4331000-memory.dmp

        Filesize

        4KB

      • memory/3824-4-0x00000251D4320000-0x00000251D4321000-memory.dmp

        Filesize

        4KB

      • memory/3824-0-0x00000251D40C0000-0x00000251D42FE000-memory.dmp

        Filesize

        2.2MB

      • memory/3824-7-0x00000251D4350000-0x00000251D4351000-memory.dmp

        Filesize

        4KB

      • memory/3824-8-0x00000251D4390000-0x00000251D4391000-memory.dmp

        Filesize

        4KB

      • memory/3824-10-0x00000251D43C0000-0x00000251D43C1000-memory.dmp

        Filesize

        4KB

      • memory/3824-9-0x00000251D43A0000-0x00000251D43A1000-memory.dmp

        Filesize

        4KB

      • memory/3824-11-0x00000251D4480000-0x00000251D4481000-memory.dmp

        Filesize

        4KB

      • memory/3824-2-0x00000251D4300000-0x00000251D4301000-memory.dmp

        Filesize

        4KB

      • memory/3824-1-0x00000251D4060000-0x00000251D4061000-memory.dmp

        Filesize

        4KB