Analysis
-
max time kernel
0s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 17:12
Static task
static1
Behavioral task
behavioral1
Sample
cbf762fb16cfe0149b46a61f3fb029fd.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbf762fb16cfe0149b46a61f3fb029fd.dll
Resource
win10v2004-20240226-en
General
-
Target
cbf762fb16cfe0149b46a61f3fb029fd.dll
-
Size
38KB
-
MD5
cbf762fb16cfe0149b46a61f3fb029fd
-
SHA1
24d70407e12631bd83f39164bcd5ca6a74a0b459
-
SHA256
2cd5879589f6af26488a2c9451d279306c472302375916e34f2646e7095ce4b9
-
SHA512
e26dd9fcb24b7357da2230c87d6ee7ed59f1288118160b42d92161a42e77a91077a8a9c6b9ab49a68f6cdf7135d57be3a465190118112d1c0a49e7408b28a853
-
SSDEEP
768:tNB4vRN8egwET/AOBHR9T7lGFDZFpVNKu90lQtwPFhXB+6OPvF65IM0:5A8ugn5T7le1l1Gb+6OPvdM
Malware Config
Signatures
-
Detect magniber ransomware 1 IoCs
resource yara_rule behavioral2/memory/3520-0-0x000001A8A7D50000-0x000001A8A8688000-memory.dmp family_magniber -
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3520 set thread context of 756 3520 rundll32.exe 51 PID 3520 set thread context of 2596 3520 rundll32.exe 52 PID 3520 set thread context of 3128 3520 rundll32.exe 54 PID 3520 set thread context of 3416 3520 rundll32.exe 57 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3520 rundll32.exe 3520 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe 3520 rundll32.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2596
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3128
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbf762fb16cfe0149b46a61f3fb029fd.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3520
-