Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
11-08-2023 18:35
Behavioral task
behavioral1
Sample
Magicratbggdhgejff1_browsingExe.exe
Resource
win7-20230712-en
5 signatures
150 seconds
General
-
Target
Magicratbggdhgejff1_browsingExe.exe
-
Size
18.5MB
-
MD5
b4c9b903dfd18bd67a3824b0109f955b
-
SHA1
a3555a77826df6c8b2886cc0f40e7d7a2bd99610
-
SHA256
f6827dc5af661fbb4bf64bc625c78283ef836c6985bb2bfb836bd0c8d5397332
-
SHA512
73ec5620b9c607c96e883d95ac6ea4033444cb74def871d16875bb90cdf6560e592c1dcb9d6e9b406cd7d238464f46f61ca5f95bf07b0367ee826971ff151aed
-
SSDEEP
196608:99rTfn5Mp6Z9j2ujTh4e9q77AJsv6tWKFdu9CqK:9F+p6Z3Ph4e9qoJsv6tWKFdu9C
Malware Config
Signatures
-
Detected MagicRAT payload 14 IoCs
resource yara_rule behavioral1/memory/1016-58-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-59-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-70-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-71-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-72-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-73-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-74-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-75-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-76-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-77-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-78-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-79-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-80-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat behavioral1/memory/1016-81-0x0000000000400000-0x000000000167E000-memory.dmp family_magicrat -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe 2208 schtasks.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1016 Magicratbggdhgejff1_browsingExe.exe 1016 Magicratbggdhgejff1_browsingExe.exe 1016 Magicratbggdhgejff1_browsingExe.exe 1016 Magicratbggdhgejff1_browsingExe.exe 1016 Magicratbggdhgejff1_browsingExe.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2836 1016 Magicratbggdhgejff1_browsingExe.exe 30 PID 1016 wrote to memory of 2836 1016 Magicratbggdhgejff1_browsingExe.exe 30 PID 1016 wrote to memory of 2836 1016 Magicratbggdhgejff1_browsingExe.exe 30 PID 2836 wrote to memory of 1400 2836 cmd.exe 32 PID 2836 wrote to memory of 1400 2836 cmd.exe 32 PID 2836 wrote to memory of 1400 2836 cmd.exe 32 PID 1016 wrote to memory of 2820 1016 Magicratbggdhgejff1_browsingExe.exe 33 PID 1016 wrote to memory of 2820 1016 Magicratbggdhgejff1_browsingExe.exe 33 PID 1016 wrote to memory of 2820 1016 Magicratbggdhgejff1_browsingExe.exe 33 PID 2820 wrote to memory of 2728 2820 cmd.exe 35 PID 2820 wrote to memory of 2728 2820 cmd.exe 35 PID 2820 wrote to memory of 2728 2820 cmd.exe 35 PID 1016 wrote to memory of 2296 1016 Magicratbggdhgejff1_browsingExe.exe 36 PID 1016 wrote to memory of 2296 1016 Magicratbggdhgejff1_browsingExe.exe 36 PID 1016 wrote to memory of 2296 1016 Magicratbggdhgejff1_browsingExe.exe 36 PID 2296 wrote to memory of 2876 2296 cmd.exe 38 PID 2296 wrote to memory of 2876 2296 cmd.exe 38 PID 2296 wrote to memory of 2876 2296 cmd.exe 38 PID 1016 wrote to memory of 2816 1016 Magicratbggdhgejff1_browsingExe.exe 39 PID 1016 wrote to memory of 2816 1016 Magicratbggdhgejff1_browsingExe.exe 39 PID 1016 wrote to memory of 2816 1016 Magicratbggdhgejff1_browsingExe.exe 39 PID 2816 wrote to memory of 2712 2816 cmd.exe 41 PID 2816 wrote to memory of 2712 2816 cmd.exe 41 PID 2816 wrote to memory of 2712 2816 cmd.exe 41 PID 1016 wrote to memory of 2732 1016 Magicratbggdhgejff1_browsingExe.exe 42 PID 1016 wrote to memory of 2732 1016 Magicratbggdhgejff1_browsingExe.exe 42 PID 1016 wrote to memory of 2732 1016 Magicratbggdhgejff1_browsingExe.exe 42 PID 2732 wrote to memory of 2208 2732 cmd.exe 44 PID 2732 wrote to memory of 2208 2732 cmd.exe 44 PID 2732 wrote to memory of 2208 2732 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\Magicratbggdhgejff1_browsingExe.exe"C:\Users\Admin\AppData\Local\Temp\Magicratbggdhgejff1_browsingExe.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\system32\cmd.execmd.exe /c bcdedit2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\bcdedit.exebcdedit3⤵PID:1400
-
-
-
C:\Windows\system32\cmd.execmd.exe /c schtasks /create /tn "OneDrive AutoRemove" /tr "C:\Windows\System32\cmd.exe /c del /f /q C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe" /sc daily /st 10:30:30 /ru SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "OneDrive AutoRemove" /tr "C:\Windows\System32\cmd.exe /c del /f /q C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe" /sc daily /st 10:30:30 /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:2728
-
-
-
C:\Windows\system32\cmd.execmd.exe /c schtasks /delete /f /tn "Microsoft\Windows\light Service Manager"2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Microsoft\Windows\light Service Manager"3⤵PID:2876
-
-
-
C:\Windows\system32\cmd.execmd.exe /c bcdedit2⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\bcdedit.exebcdedit3⤵PID:2712
-
-
-
C:\Windows\system32\cmd.execmd.exe /c schtasks /create /tn "Microsoft\Windows\light Service Manager" /tr C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe /sc onstart /ru SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\schtasks.exeschtasks /create /tn "Microsoft\Windows\light Service Manager" /tr C:/Users/Admin/AppData/Local/Temp/Magicratbggdhgejff1_browsingExe.exe /sc onstart /ru SYSTEM3⤵
- Creates scheduled task(s)
PID:2208
-
-