Skip to main content
The Keyword
Magniber ransomware actors used a variant of Microsoft SmartScreen bypass
["What is the Fitbit Air?", "How can I learn new AI skills?", "What's the latest Android news?"]

Magniber ransomware actors used a variant of Microsoft SmartScreen bypass



High level overview of security warning dialog logic

flow chart of a security warning dialog logic

shdocvw.dll’s DoSafeOpenPromptForShellExec pseudocode

an image showing code

smartscreen.exe’s windows::security::signature_info::retrieve pseudocode

an image of code

Magniber used CVE-2022-44698 by providing a signer certificate serial number that is not present in the signature certificates.

image of code

Comparison between the certificates included in a Magniber and Qakbot signature

an image showing code

CVE-2022-44698 patch of windows::security::signature_info::retrieve

image of code

smartscreen.exe’s windows::security::authenticode_information::create pseudocode

image of code

Magniber corrupted the SPC_INDIRECT_DATA_OBJID NID, which leads to crypt_provider_data->pPDSip->psIndirectData being NULL and an error being raised.

image of code

Let’s stay in touch. Get the latest news from Google in your inbox.

Subscribe