MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 50e1387078955b69ab956d0f81e935ab6ac9c0260131dd4fa2d3199b681750ee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Magniber


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 50e1387078955b69ab956d0f81e935ab6ac9c0260131dd4fa2d3199b681750ee
SHA3-384 hash: 2f282c85a311f688a0c6f4122591f0b0006a0ae2600b913760146aed80a4cb76cca09bce8c4e1fca2d286fd12a8d5baa
SHA1 hash: 39427ea475e305e639ecf14984ffaf42c7442cfe
MD5 hash: f664bd350fe4de5d2d003daeb9b4fdf4
humanhash: chicken-oxygen-uniform-delta
File name:MS.System.Critical.Update.Win10.0-KB17753003.msi
Download: download sample
Signature Magniber
File size:1'249'280 bytes
First seen:2022-05-09 15:32:29 UTC
Last seen:2022-06-01 13:25:27 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 1536:HfJj3ZhpUNmojx+HwSm8757B0Ds0Dw7bx:HIkKxzknx
Threatray 43 similar samples on MalwareBazaar
TLSH T151454E2A3A432381F5FE6570D4FB92214919DDF45D17B3292C4D3ACCCCBD8E5682AE68
TrID 88.4% (.MST) Windows SDK Setup Transform script (61000/1/5)
11.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter obfusor
Tags:Magniber msi Ransomware

Intelligence


File Origin
# of uploads :
3
# of downloads :
361
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
magniber packed packed ransomware wacatac
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans.evad
Score:
72 / 100
Signature
Creates a thread in another existing process (thread injection)
Maps a DLL or memory area into another process
Modifies existing user documents (likely ransomware behavior)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 622800 Sample: MS.System.Critical.Update.W... Startdate: 09/05/2022 Architecture: WINDOWS Score: 72 94 Multi AV Scanner detection for dropped file 2->94 96 Multi AV Scanner detection for submitted file 2->96 10 msiexec.exe 71 29 2->10         started        13 msiexec.exe 3 2->13         started        process3 file4 74 C:\Windows\Installer\MSI8E17.tmp, PE32+ 10->74 dropped 15 msiexec.exe 3 10->15         started        process5 file6 76 C:\Users\user\Desktop\...76EBFQQYWPS.docx, data 15->76 dropped 78 C:\Users\user\Desktop\LSBIHQFDVT.xlsx, data 15->78 dropped 80 C:\Users\user\Desktop\...\IPKGELNTQY.docx, data 15->80 dropped 82 C:\Users\user\Documents\IPKGELNTQY.xlsx, COM 15->82 dropped 86 Modifies the context of a thread in another process (thread injection) 15->86 88 Maps a DLL or memory area into another process 15->88 90 Creates a thread in another existing process (thread injection) 15->90 92 Modifies existing user documents (likely ransomware behavior) 15->92 19 svchost.exe 4 15->19 injected 21 sihost.exe 2 15->21 injected 23 svchost.exe 15->23 injected signatures7 process8 process9 25 cmd.exe 19->25         started        27 cmd.exe 19->27         started        39 2 other processes 19->39 29 cmd.exe 1 21->29         started        31 cmd.exe 21->31         started        41 2 other processes 21->41 33 cmd.exe 23->33         started        35 cmd.exe 23->35         started        37 regsvr32.exe 23->37         started        process10 43 fodhelper.exe 25->43         started        46 conhost.exe 25->46         started        56 2 other processes 27->56 48 fodhelper.exe 12 29->48         started        50 conhost.exe 29->50         started        52 fodhelper.exe 12 31->52         started        54 conhost.exe 31->54         started        58 2 other processes 33->58 60 2 other processes 35->60 dnsIp11 84 192.168.2.1 unknown unknown 43->84 62 regsvr32.exe 43->62         started        64 regsvr32.exe 48->64         started        66 regsvr32.exe 52->66         started        68 regsvr32.exe 56->68         started        70 regsvr32.exe 58->70         started        72 regsvr32.exe 60->72         started        process12
Threat name:
Win64.Ransomware.Magni
Status:
Malicious
First seen:
2022-05-09 15:33:07 UTC
File Type:
Binary (Archive)
Extracted files:
26
AV detection:
5 of 41 (12.20%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
persistence ransomware
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Interacts with shadow copies
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Enumerates connected drives
Loads dropped DLL
Modifies extensions of user files
Deletes shadow copies
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments