Analysis

  • max time kernel
    0s
  • max time network
    23s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-02-2024 13:29

General

  • Target

    a3e7152abd213f303c1561aa20ed9cea.dll

  • Size

    38KB

  • MD5

    a3e7152abd213f303c1561aa20ed9cea

  • SHA1

    0cfb6ac5f567c4dd3e9ebe741c2b8b0e19cb243e

  • SHA256

    8ab78bc8884b9de573a3dc19e7fc206e925f643aee3f152d19e8d1caa90b6312

  • SHA512

    854dad9d639cb4c9860c7dcd2d1bb7204ce3efe0a5bc0521d37a61e7ef3787a8334620d718ec2abdbbd077122c008273ce29cf1382af45d8411c431f5cf2e777

  • SSDEEP

    768:bL2WWrr4WdC5pqndJgr8q39GGL3RqL9Q1VW028JQyt3uh11yCg:GdC5pqndJIHtGCE9Q1rRxIM

Score
10/10

Malware Config

Signatures

  • Detect magniber ransomware 1 IoCs
  • Magniber Ransomware

    Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a3e7152abd213f303c1561aa20ed9cea.dll,#1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3764
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2652
    • C:\Windows\system32\sihost.exe
      sihost.exe
      1⤵
        PID:2580

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2580-0-0x0000026CB6520000-0x0000026CB6525000-memory.dmp

        Filesize

        20KB

      • memory/3764-1-0x0000022135B20000-0x0000022136169000-memory.dmp

        Filesize

        6.3MB

      • memory/3764-3-0x00000221359A0000-0x00000221359A1000-memory.dmp

        Filesize

        4KB

      • memory/3764-4-0x00000221359B0000-0x00000221359B1000-memory.dmp

        Filesize

        4KB

      • memory/3764-6-0x00000221359C0000-0x00000221359C1000-memory.dmp

        Filesize

        4KB

      • memory/3764-7-0x00000221359D0000-0x00000221359D1000-memory.dmp

        Filesize

        4KB

      • memory/3764-8-0x00000221359E0000-0x00000221359E1000-memory.dmp

        Filesize

        4KB

      • memory/3764-9-0x00000221359F0000-0x00000221359F1000-memory.dmp

        Filesize

        4KB

      • memory/3764-11-0x0000022135A00000-0x0000022135A01000-memory.dmp

        Filesize

        4KB

      • memory/3764-15-0x0000022135A60000-0x0000022135A61000-memory.dmp

        Filesize

        4KB

      • memory/3764-13-0x0000022135A50000-0x0000022135A51000-memory.dmp

        Filesize

        4KB

      • memory/3764-12-0x0000022135A40000-0x0000022135A41000-memory.dmp

        Filesize

        4KB