Analysis

  • max time kernel
    0s
  • max time network
    7s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2024 19:57

General

  • Target

    aa07b96ab22c192c74f703b5df686c0e.dll

  • Size

    38KB

  • MD5

    aa07b96ab22c192c74f703b5df686c0e

  • SHA1

    127443fe311a7f4d6a6823ebceee705865d9a14f

  • SHA256

    7ceec3030c119c0b32adf031494a95eaa53d74205a1db89788ad5ced0220af4f

  • SHA512

    aef837180cd8aa69426fbbd530b27dd6630f8f2cc1b3a1b84a55aab335df44fb8ef54a5f5bb1a82663e29b034eaf7204a8adfa818edfe1525bd1b2c5c3fcee98

  • SSDEEP

    768:RjWwU9acnUuAMU24OIPDG02NLMCaYr/Dwy2ycKi/+hw:RS7kcTfmGhNAFOsjKi+

Score
10/10

Malware Config

Signatures

  • Detect magniber ransomware 2 IoCs
  • Magniber Ransomware

    Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2488
    • C:\Windows\system32\sihost.exe
      sihost.exe
      1⤵
        PID:2468
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa07b96ab22c192c74f703b5df686c0e.dll,#1
        1⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2364

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2364-8-0x000001617A200000-0x000001617A201000-memory.dmp

        Filesize

        4KB

      • memory/2364-9-0x000001617A240000-0x000001617A241000-memory.dmp

        Filesize

        4KB

      • memory/2364-3-0x000001617A1C0000-0x000001617A1C1000-memory.dmp

        Filesize

        4KB

      • memory/2364-4-0x000001617A1D0000-0x000001617A1D1000-memory.dmp

        Filesize

        4KB

      • memory/2364-2-0x000001617A1B0000-0x000001617A1B1000-memory.dmp

        Filesize

        4KB

      • memory/2364-5-0x000001617A1E0000-0x000001617A1E1000-memory.dmp

        Filesize

        4KB

      • memory/2364-1-0x0000016179E00000-0x0000016179E01000-memory.dmp

        Filesize

        4KB

      • memory/2364-14-0x000001617A270000-0x000001617A271000-memory.dmp

        Filesize

        4KB

      • memory/2364-11-0x000001617A250000-0x000001617A251000-memory.dmp

        Filesize

        4KB

      • memory/2364-0-0x0000016179F10000-0x000001617A1A4000-memory.dmp

        Filesize

        2.6MB

      • memory/2364-6-0x000001617A1F0000-0x000001617A1F1000-memory.dmp

        Filesize

        4KB

      • memory/2364-13-0x000001617A260000-0x000001617A261000-memory.dmp

        Filesize

        4KB

      • memory/2468-7-0x0000015C2A210000-0x0000015C2A215000-memory.dmp

        Filesize

        20KB

      • memory/2468-16-0x0000015C2A210000-0x0000015C2A215000-memory.dmp

        Filesize

        20KB