Analysis
-
max time kernel
1s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2023 09:39
Static task
static1
Behavioral task
behavioral1
Sample
06acd697bc0a41a6fa1098eba46ddd40d029a5fef3eb152fbf9d0d39e6f8673d.dll
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
06acd697bc0a41a6fa1098eba46ddd40d029a5fef3eb152fbf9d0d39e6f8673d.dll
Resource
win10v2004-20231127-en
General
-
Target
06acd697bc0a41a6fa1098eba46ddd40d029a5fef3eb152fbf9d0d39e6f8673d.dll
-
Size
38KB
-
MD5
96d505aa061f15eff5b723ae3f82bc98
-
SHA1
fadec5f3bd444044ec269334cfb1ee9fff41da12
-
SHA256
06acd697bc0a41a6fa1098eba46ddd40d029a5fef3eb152fbf9d0d39e6f8673d
-
SHA512
925fdeb3b7cdf337ac809cd2e35b8301020dd1c6f9da25754e2a0b762c2a4a187090777c97c26cd43fd93297f62b00c15593579eadd9cb72f187dc1793cf7ed0
-
SSDEEP
768:biAFh5YBIKGMZmJ1/VTrzDSXl+h6AbUMP02Q3NYVdQDVMM:bT2nZoVTrzDSjVMEvWM
Malware Config
Signatures
-
Detect magniber ransomware 2 IoCs
resource yara_rule behavioral2/memory/3824-0-0x00000251D40C0000-0x00000251D42FE000-memory.dmp family_magniber behavioral2/memory/2472-13-0x0000024063B50000-0x0000024063B55000-memory.dmp family_magniber -
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3824 set thread context of 2472 3824 rundll32.exe 47 PID 3824 set thread context of 2508 3824 rundll32.exe 45 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3824 rundll32.exe 3824 rundll32.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3824 rundll32.exe 3824 rundll32.exe 3824 rundll32.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2508
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2472
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06acd697bc0a41a6fa1098eba46ddd40d029a5fef3eb152fbf9d0d39e6f8673d.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3824