Overview
overview
10Static
static
10up.zip
windows7-x64
1up.zip
windows10-2004-x64
1Cloakedbgf...so.iso
windows7-x64
3Cloakedbgf...so.iso
windows10-2004-x64
3Information.lnk
windows7-x64
3Information.lnk
windows10-2004-x64
6_
windows7-x64
1_
windows10-2004-x64
1agenda.exe
windows7-x64
1agenda.exe
windows10-2004-x64
6vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
8vctool140.dll
windows7-x64
1vctool140.dll
windows10-2004-x64
8Guloaderbg...so.iso
windows7-x64
3Guloaderbg...so.iso
windows10-2004-x64
3Iisbgfhaci...ll.dll
windows7-x64
3Iisbgfhaci...ll.dll
windows10-2004-x64
3Iranbggaia...xe.exe
windows7-x64
7Iranbggaia...xe.exe
windows10-2004-x64
7Knotweedbg...ll.dll
windows7-x64
1Knotweedbg...ll.dll
windows10-2004-x64
1Magicratbg...xe.exe
windows7-x64
10Magicratbg...xe.exe
windows10-2004-x64
10Newcoppers...xe.exe
windows7-x64
4Newcoppers...xe.exe
windows10-2004-x64
4Newlogfors...xe.exe
windows7-x64
4Newlogfors...xe.exe
windows10-2004-x64
4Purecrypte...xe.dll
windows7-x64
1Purecrypte...xe.dll
windows10-2004-x64
1Purecrypte...xe.dll
windows7-x64
1Purecrypte...xe.dll
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
01-08-2023 19:38
Behavioral task
behavioral1
Sample
up.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
up.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Cloakedbgfjfjjaea5_browsingIso.iso
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Cloakedbgfjfjjaea5_browsingIso.iso
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Information.lnk
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Information.lnk
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
_
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
_
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
agenda.exe
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
agenda.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
vcruntime140.dll
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
vcruntime140.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
vctool140.dll
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
vctool140.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral15
Sample
Guloaderbgghjjdjcc1_browsingIso.iso
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
Guloaderbgghjjdjcc1_browsingIso.iso
Resource
win10v2004-20230703-en
Behavioral task
behavioral17
Sample
Iisbgfhaciadc2_browsingDll.dll
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
Iisbgfhaciadc2_browsingDll.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral19
Sample
Iranbggaiajfbi13_browsingExe.exe
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
Iranbggaiajfbi13_browsingExe.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral21
Sample
Knotweedbgfjcfhafh13_browsingDll.dll
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
Knotweedbgfjcfhafh13_browsingDll.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral23
Sample
Magicratbggdhgejff1_browsingExe.exe
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
Magicratbggdhgejff1_browsingExe.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral25
Sample
Newcopperstealer10_browsingExe.exe
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
Newcopperstealer10_browsingExe.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral27
Sample
Newlogforshell18_browsingExe.exe
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
Newlogforshell18_browsingExe.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral29
Sample
Purecrypter12_browsingExe.dll
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
Purecrypter12_browsingExe.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral31
Sample
Purecrypter16_browsingExe.dll
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
Purecrypter16_browsingExe.dll
Resource
win10v2004-20230703-en
General
-
Target
Magicratbggdhgejff1_browsingExe.exe
-
Size
18.5MB
-
MD5
b4c9b903dfd18bd67a3824b0109f955b
-
SHA1
a3555a77826df6c8b2886cc0f40e7d7a2bd99610
-
SHA256
f6827dc5af661fbb4bf64bc625c78283ef836c6985bb2bfb836bd0c8d5397332
-
SHA512
73ec5620b9c607c96e883d95ac6ea4033444cb74def871d16875bb90cdf6560e592c1dcb9d6e9b406cd7d238464f46f61ca5f95bf07b0367ee826971ff151aed
-
SSDEEP
196608:99rTfn5Mp6Z9j2ujTh4e9q77AJsv6tWKFdu9CqK:9F+p6Z3Ph4e9qoJsv6tWKFdu9C
Malware Config
Signatures
-
Detected MagicRAT payload 14 IoCs
resource yara_rule behavioral23/memory/1228-59-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-60-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-79-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-80-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-81-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-82-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-83-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-84-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-85-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-86-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-87-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-88-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-89-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral23/memory/1228-90-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe 2704 schtasks.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1228 Magicratbggdhgejff1_browsingExe.exe 1228 Magicratbggdhgejff1_browsingExe.exe 1228 Magicratbggdhgejff1_browsingExe.exe 1228 Magicratbggdhgejff1_browsingExe.exe 1228 Magicratbggdhgejff1_browsingExe.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2912 1228 Magicratbggdhgejff1_browsingExe.exe 30 PID 1228 wrote to memory of 2912 1228 Magicratbggdhgejff1_browsingExe.exe 30 PID 1228 wrote to memory of 2912 1228 Magicratbggdhgejff1_browsingExe.exe 30 PID 2912 wrote to memory of 3028 2912 cmd.exe 32 PID 2912 wrote to memory of 3028 2912 cmd.exe 32 PID 2912 wrote to memory of 3028 2912 cmd.exe 32 PID 1228 wrote to memory of 2900 1228 Magicratbggdhgejff1_browsingExe.exe 34 PID 1228 wrote to memory of 2900 1228 Magicratbggdhgejff1_browsingExe.exe 34 PID 1228 wrote to memory of 2900 1228 Magicratbggdhgejff1_browsingExe.exe 34 PID 2900 wrote to memory of 2776 2900 cmd.exe 35 PID 2900 wrote to memory of 2776 2900 cmd.exe 35 PID 2900 wrote to memory of 2776 2900 cmd.exe 35 PID 1228 wrote to memory of 2680 1228 Magicratbggdhgejff1_browsingExe.exe 36 PID 1228 wrote to memory of 2680 1228 Magicratbggdhgejff1_browsingExe.exe 36 PID 1228 wrote to memory of 2680 1228 Magicratbggdhgejff1_browsingExe.exe 36 PID 2680 wrote to memory of 2796 2680 cmd.exe 38 PID 2680 wrote to memory of 2796 2680 cmd.exe 38 PID 2680 wrote to memory of 2796 2680 cmd.exe 38 PID 1228 wrote to memory of 2712 1228 Magicratbggdhgejff1_browsingExe.exe 40 PID 1228 wrote to memory of 2712 1228 Magicratbggdhgejff1_browsingExe.exe 40 PID 1228 wrote to memory of 2712 1228 Magicratbggdhgejff1_browsingExe.exe 40 PID 2712 wrote to memory of 2672 2712 cmd.exe 41 PID 2712 wrote to memory of 2672 2712 cmd.exe 41 PID 2712 wrote to memory of 2672 2712 cmd.exe 41 PID 1228 wrote to memory of 2732 1228 Magicratbggdhgejff1_browsingExe.exe 43 PID 1228 wrote to memory of 2732 1228 Magicratbggdhgejff1_browsingExe.exe 43 PID 1228 wrote to memory of 2732 1228 Magicratbggdhgejff1_browsingExe.exe 43 PID 2732 wrote to memory of 2704 2732 cmd.exe 44 PID 2732 wrote to memory of 2704 2732 cmd.exe 44 PID 2732 wrote to memory of 2704 2732 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\Magicratbggdhgejff1_browsingExe.exe"C:\Users\Admin\AppData\Local\Temp\Magicratbggdhgejff1_browsingExe.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\cmd.execmd.exe /c bcdedit2⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\bcdedit.exebcdedit3⤵PID:3028
-
-
-
C:\Windows\system32\cmd.execmd.exe /c schtasks /create /tn "OneDrive AutoRemove" /tr "C:\Windows\System32\cmd.exe /c del /f /q C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe" /sc daily /st 10:30:30 /ru SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "OneDrive AutoRemove" /tr "C:\Windows\System32\cmd.exe /c del /f /q C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe" /sc daily /st 10:30:30 /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:2776
-
-
-
C:\Windows\system32\cmd.execmd.exe /c schtasks /delete /f /tn "Microsoft\Windows\light Service Manager"2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Microsoft\Windows\light Service Manager"3⤵PID:2796
-
-
-
C:\Windows\system32\cmd.execmd.exe /c bcdedit2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\bcdedit.exebcdedit3⤵PID:2672
-
-
-
C:\Windows\system32\cmd.execmd.exe /c schtasks /create /tn "Microsoft\Windows\light Service Manager" /tr C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe /sc onstart /ru SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "Microsoft\Windows\light Service Manager" /tr C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe /sc onstart /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:2704
-
-