Threat Analysis Group

Magniber ransomware actors used a variant of Microsoft SmartScreen bypass



flow chart of a security warning dialog logic

High level overview of security warning dialog logic

an image showing code

shdocvw.dll’s DoSafeOpenPromptForShellExec pseudocode

an image of code

smartscreen.exe’s windows::security::signature_info::retrieve pseudocode

image of code

Magniber used CVE-2022-44698 by providing a signer certificate serial number that is not present in the signature certificates.

an image showing code

Comparison between the certificates included in a Magniber and Qakbot signature

image of code

CVE-2022-44698 patch of windows::security::signature_info::retrieve

image of code

smartscreen.exe’s windows::security::authenticode_information::create pseudocode

image of code

Magniber corrupted the SPC_INDIRECT_DATA_OBJID NID, which leads to crypt_provider_data->pPDSip->psIndirectData being NULL and an error being raised.