Analysis
-
max time kernel
166s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2023 18:11
Behavioral task
behavioral1
Sample
Magicratbggdhgejff1_browsingExe.exe
Resource
win7-20230712-en
5 signatures
150 seconds
General
-
Target
Magicratbggdhgejff1_browsingExe.exe
-
Size
18.5MB
-
MD5
b4c9b903dfd18bd67a3824b0109f955b
-
SHA1
a3555a77826df6c8b2886cc0f40e7d7a2bd99610
-
SHA256
f6827dc5af661fbb4bf64bc625c78283ef836c6985bb2bfb836bd0c8d5397332
-
SHA512
73ec5620b9c607c96e883d95ac6ea4033444cb74def871d16875bb90cdf6560e592c1dcb9d6e9b406cd7d238464f46f61ca5f95bf07b0367ee826971ff151aed
-
SSDEEP
196608:99rTfn5Mp6Z9j2ujTh4e9q77AJsv6tWKFdu9CqK:9F+p6Z3Ph4e9qoJsv6tWKFdu9C
Malware Config
Signatures
-
Detected MagicRAT payload 12 IoCs
resource yara_rule behavioral2/memory/2392-138-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-139-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-140-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-146-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-147-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-148-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-149-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-150-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-151-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-152-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-153-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral2/memory/2392-154-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat -
Program crash 1 IoCs
pid pid_target Process procid_target 2908 2392 WerFault.exe 79 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2464 schtasks.exe 2188 schtasks.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2392 Magicratbggdhgejff1_browsingExe.exe 2392 Magicratbggdhgejff1_browsingExe.exe 2392 Magicratbggdhgejff1_browsingExe.exe 2392 Magicratbggdhgejff1_browsingExe.exe 2392 Magicratbggdhgejff1_browsingExe.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2816 2392 Magicratbggdhgejff1_browsingExe.exe 82 PID 2392 wrote to memory of 2816 2392 Magicratbggdhgejff1_browsingExe.exe 82 PID 2816 wrote to memory of 1552 2816 cmd.exe 84 PID 2816 wrote to memory of 1552 2816 cmd.exe 84 PID 2392 wrote to memory of 4384 2392 Magicratbggdhgejff1_browsingExe.exe 85 PID 2392 wrote to memory of 4384 2392 Magicratbggdhgejff1_browsingExe.exe 85 PID 4384 wrote to memory of 2464 4384 cmd.exe 87 PID 4384 wrote to memory of 2464 4384 cmd.exe 87 PID 2392 wrote to memory of 5036 2392 Magicratbggdhgejff1_browsingExe.exe 88 PID 2392 wrote to memory of 5036 2392 Magicratbggdhgejff1_browsingExe.exe 88 PID 5036 wrote to memory of 3444 5036 cmd.exe 90 PID 5036 wrote to memory of 3444 5036 cmd.exe 90 PID 2392 wrote to memory of 4092 2392 Magicratbggdhgejff1_browsingExe.exe 91 PID 2392 wrote to memory of 4092 2392 Magicratbggdhgejff1_browsingExe.exe 91 PID 4092 wrote to memory of 1468 4092 cmd.exe 93 PID 4092 wrote to memory of 1468 4092 cmd.exe 93 PID 2392 wrote to memory of 4624 2392 Magicratbggdhgejff1_browsingExe.exe 94 PID 2392 wrote to memory of 4624 2392 Magicratbggdhgejff1_browsingExe.exe 94 PID 4624 wrote to memory of 2188 4624 cmd.exe 96 PID 4624 wrote to memory of 2188 4624 cmd.exe 96 PID 2392 wrote to memory of 2908 2392 Magicratbggdhgejff1_browsingExe.exe 104 PID 2392 wrote to memory of 2908 2392 Magicratbggdhgejff1_browsingExe.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Magicratbggdhgejff1_browsingExe.exe"C:\Users\Admin\AppData\Local\Temp\Magicratbggdhgejff1_browsingExe.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c bcdedit2⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\bcdedit.exebcdedit3⤵PID:1552
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c schtasks /create /tn "OneDrive AutoRemove" /tr "C:\Windows\System32\cmd.exe /c del /f /q C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe" /sc daily /st 10:30:30 /ru SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "OneDrive AutoRemove" /tr "C:\Windows\System32\cmd.exe /c del /f /q C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe" /sc daily /st 10:30:30 /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:2464
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c schtasks /delete /f /tn "Microsoft\Windows\light Service Manager"2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Microsoft\Windows\light Service Manager"3⤵PID:3444
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c bcdedit2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\system32\bcdedit.exebcdedit3⤵PID:1468
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c schtasks /create /tn "Microsoft\Windows\light Service Manager" /tr C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe /sc onstart /ru SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "Microsoft\Windows\light Service Manager" /tr C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe /sc onstart /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:2188
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2392 -s 10642⤵
- Program crash
PID:2908
-