Analysis
-
max time kernel
131s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 16:22
Static task
static1
Behavioral task
behavioral1
Sample
JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe
Resource
win10v20201028
General
-
Target
JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe
-
Size
994KB
-
MD5
86c59d1e4de693a0f5d2ffe3b1cd8ef9
-
SHA1
64e5247411bbeff10fb09f0f8efe3d923d13f0a5
-
SHA256
ae0867ee2b8d439245831fa1884fc5ef80cf9e38e43d1059e8030d2c433e4040
-
SHA512
1ef4ea0020c2f2058b369e045a8a5eea071dd73408507ab06dcef1f1b9fbd1b8bf96ef73cb756296a4d7646185eb1e1c01814f9d23446f27ac14d625e36284c5
Malware Config
Extracted
warzonerat
urchy.duckdns.org:30251
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2004-16-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/2004-17-0x0000000000405CE2-mapping.dmp warzonerat behavioral2/memory/2004-18-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 3944 images.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exedescription pid process target process PID 3888 set thread context of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exepowershell.exepid process 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe 1312 powershell.exe 1312 powershell.exe 1312 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exepowershell.exedescription pid process Token: SeDebugPrivilege 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe Token: SeDebugPrivilege 1312 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exeJANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exedescription pid process target process PID 3888 wrote to memory of 1520 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe schtasks.exe PID 3888 wrote to memory of 1520 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe schtasks.exe PID 3888 wrote to memory of 1520 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe schtasks.exe PID 3888 wrote to memory of 4084 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 4084 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 4084 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 4092 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 4092 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 4092 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 3888 wrote to memory of 2004 3888 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe PID 2004 wrote to memory of 1312 2004 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe powershell.exe PID 2004 wrote to memory of 1312 2004 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe powershell.exe PID 2004 wrote to memory of 1312 2004 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe powershell.exe PID 2004 wrote to memory of 3944 2004 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe images.exe PID 2004 wrote to memory of 3944 2004 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe images.exe PID 2004 wrote to memory of 3944 2004 JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe images.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe"C:\Users\Admin\AppData\Local\Temp\JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\biBtzY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp58DF.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe"C:\Users\Admin\AppData\Local\Temp\JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe"C:\Users\Admin\AppData\Local\Temp\JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe"C:\Users\Admin\AppData\Local\Temp\JANUARY QUOTATION FOR PRODUCT ORDER 02983H G FOR Goldolphin INDUSTRIES LTD PACKING LIST FOR 60MM.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeMD5
86c59d1e4de693a0f5d2ffe3b1cd8ef9
SHA164e5247411bbeff10fb09f0f8efe3d923d13f0a5
SHA256ae0867ee2b8d439245831fa1884fc5ef80cf9e38e43d1059e8030d2c433e4040
SHA5121ef4ea0020c2f2058b369e045a8a5eea071dd73408507ab06dcef1f1b9fbd1b8bf96ef73cb756296a4d7646185eb1e1c01814f9d23446f27ac14d625e36284c5
-
C:\ProgramData\images.exeMD5
86c59d1e4de693a0f5d2ffe3b1cd8ef9
SHA164e5247411bbeff10fb09f0f8efe3d923d13f0a5
SHA256ae0867ee2b8d439245831fa1884fc5ef80cf9e38e43d1059e8030d2c433e4040
SHA5121ef4ea0020c2f2058b369e045a8a5eea071dd73408507ab06dcef1f1b9fbd1b8bf96ef73cb756296a4d7646185eb1e1c01814f9d23446f27ac14d625e36284c5
-
C:\Users\Admin\AppData\Local\Temp\tmp58DF.tmpMD5
8bf4c3ec91dc6cb643fd1d4a92d2abc8
SHA196b5b82865df0df6ee0847f94a592c333176cd23
SHA25621b6b8ae6d621c3724c9afe29230e7f8a2d06b920aa168173d76597f174d5025
SHA512f10a380cb39456ea4c6579c072207631a0b66198db88aa6d87c2b871f584efdc59aff9be5e156c2448ae1e053e9d7764b600fe11b9f4d4f8cf8abcbdffb57704
-
memory/1312-55-0x00000000094D0000-0x00000000094D1000-memory.dmpFilesize
4KB
-
memory/1312-32-0x0000000007320000-0x0000000007321000-memory.dmpFilesize
4KB
-
memory/1312-56-0x0000000009670000-0x0000000009671000-memory.dmpFilesize
4KB
-
memory/1312-35-0x00000000048B0000-0x00000000048B1000-memory.dmpFilesize
4KB
-
memory/1312-54-0x0000000009360000-0x0000000009361000-memory.dmpFilesize
4KB
-
memory/1312-47-0x00000000093A0000-0x00000000093D3000-memory.dmpFilesize
204KB
-
memory/1312-19-0x0000000000000000-mapping.dmp
-
memory/1312-44-0x00000000082E0000-0x00000000082E1000-memory.dmpFilesize
4KB
-
memory/1312-57-0x000000007E930000-0x000000007E931000-memory.dmpFilesize
4KB
-
memory/1312-38-0x00000000048B2000-0x00000000048B3000-memory.dmpFilesize
4KB
-
memory/1312-39-0x0000000007950000-0x0000000007951000-memory.dmpFilesize
4KB
-
memory/1312-40-0x00000000079F0000-0x00000000079F1000-memory.dmpFilesize
4KB
-
memory/1312-43-0x00000000080C0000-0x00000000080C1000-memory.dmpFilesize
4KB
-
memory/1312-45-0x00000000084C0000-0x00000000084C1000-memory.dmpFilesize
4KB
-
memory/1312-58-0x00000000048B3000-0x00000000048B4000-memory.dmpFilesize
4KB
-
memory/1312-59-0x0000000009620000-0x0000000009621000-memory.dmpFilesize
4KB
-
memory/1312-61-0x0000000009610000-0x0000000009611000-memory.dmpFilesize
4KB
-
memory/1312-41-0x0000000007C40000-0x0000000007C41000-memory.dmpFilesize
4KB
-
memory/1312-27-0x00000000739E0000-0x00000000740CE000-memory.dmpFilesize
6.9MB
-
memory/1312-31-0x00000000048C0000-0x00000000048C1000-memory.dmpFilesize
4KB
-
memory/1520-14-0x0000000000000000-mapping.dmp
-
memory/2004-17-0x0000000000405CE2-mapping.dmp
-
memory/2004-18-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2004-16-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/3888-13-0x0000000005EE0000-0x0000000005F35000-memory.dmpFilesize
340KB
-
memory/3888-8-0x0000000004E50000-0x0000000004E51000-memory.dmpFilesize
4KB
-
memory/3888-3-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/3888-5-0x0000000004D10000-0x0000000004D11000-memory.dmpFilesize
4KB
-
memory/3888-6-0x00000000052B0000-0x00000000052B1000-memory.dmpFilesize
4KB
-
memory/3888-2-0x0000000073A20000-0x000000007410E000-memory.dmpFilesize
6.9MB
-
memory/3888-12-0x00000000057B0000-0x00000000057D3000-memory.dmpFilesize
140KB
-
memory/3888-11-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/3888-10-0x0000000005810000-0x0000000005811000-memory.dmpFilesize
4KB
-
memory/3888-9-0x0000000004D00000-0x0000000004D01000-memory.dmpFilesize
4KB
-
memory/3888-7-0x0000000004DB0000-0x0000000004DB1000-memory.dmpFilesize
4KB
-
memory/3944-36-0x0000000004D70000-0x0000000004D71000-memory.dmpFilesize
4KB
-
memory/3944-20-0x0000000000000000-mapping.dmp
-
memory/3944-23-0x00000000739E0000-0x00000000740CE000-memory.dmpFilesize
6.9MB
-
memory/3944-30-0x0000000005550000-0x0000000005551000-memory.dmpFilesize
4KB