Analysis

  • max time kernel
    1s
  • max time network
    14s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-04-2024 20:23

Errors

Reason
Machine shutdown

General

  • Target

    f1d9097da5a25704b82246e6a1530237_JaffaCakes118.dll

  • Size

    38KB

  • MD5

    f1d9097da5a25704b82246e6a1530237

  • SHA1

    1a21d31df7941616cf6e2e3c7b790b2096ce3b4e

  • SHA256

    f104ab345da41762fa5a07302859289e162fe197c2b1270f8f5d12354a670b5e

  • SHA512

    d5f4ea9ad04dc7472c9ed1db54ff2ec570c89c53ea8374bf7da19f27ada0d7c766af457f953896d7fc62046d00a6df7a62d71ae36982b6939d75c34d2c6ae96d

  • SSDEEP

    768:1Czs1U46clW4VbXoTS22idEzKfu/m+SyNtLrSSAcLCjXUZdr:eqsclW494TSr8EzKG/NdroU

Score
10/10

Malware Config

Signatures

  • Detect magniber ransomware 1 IoCs
  • Magniber Ransomware

    Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2780
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
      1⤵
        PID:2856
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\f1d9097da5a25704b82246e6a1530237_JaffaCakes118.dll,#1
        1⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:4600

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2780-2-0x0000022276A20000-0x0000022276A25000-memory.dmp

        Filesize

        20KB

      • memory/4600-6-0x000002391DB40000-0x000002391DB41000-memory.dmp

        Filesize

        4KB

      • memory/4600-0-0x000002391DB80000-0x000002391E445000-memory.dmp

        Filesize

        8.8MB

      • memory/4600-3-0x000002391DB10000-0x000002391DB11000-memory.dmp

        Filesize

        4KB

      • memory/4600-5-0x000002391DB30000-0x000002391DB31000-memory.dmp

        Filesize

        4KB

      • memory/4600-4-0x000002391DB20000-0x000002391DB21000-memory.dmp

        Filesize

        4KB

      • memory/4600-1-0x000002391DB00000-0x000002391DB01000-memory.dmp

        Filesize

        4KB

      • memory/4600-7-0x000002391DB50000-0x000002391DB51000-memory.dmp

        Filesize

        4KB

      • memory/4600-9-0x000002391DB60000-0x000002391DB61000-memory.dmp

        Filesize

        4KB

      • memory/4600-11-0x000002391E490000-0x000002391E491000-memory.dmp

        Filesize

        4KB

      • memory/4600-13-0x000002391E4A0000-0x000002391E4A1000-memory.dmp

        Filesize

        4KB

      • memory/4600-10-0x000002391E480000-0x000002391E481000-memory.dmp

        Filesize

        4KB

      • memory/4600-15-0x000002391E4B0000-0x000002391E4B1000-memory.dmp

        Filesize

        4KB