Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-01-2021 09:06

General

  • Target

    Symptomaticshon5.exe

  • Size

    108KB

  • MD5

    09b6c8f169567f8557b2d96d9f6d3644

  • SHA1

    f37977654300daf97df6eea1235bac7ac706cc11

  • SHA256

    b6c1e3eff87deab0b2b41040d22f74c3d824bffbd161f7248f51f3640ac7b590

  • SHA512

    478839f9f93a4abb2d0e8e1c62f58c07839780631f1cdd8b288493967cdecf6e354603ad784f92e8b82425cb4868accdabb37f78cc6ea47d89ac5c1090fce5fa

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Symptomaticshon5.exe
    "C:\Users\Admin\AppData\Local\Temp\Symptomaticshon5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\AppData\Local\Temp\Symptomaticshon5.exe
      "C:\Users\Admin\AppData\Local\Temp\Symptomaticshon5.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\ProgramData\rundll.exe
        "C:\ProgramData\rundll.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\ProgramData\rundll.exe
          "C:\ProgramData\rundll.exe"
          4⤵
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:576
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe"
            5⤵
              PID:1692

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\rundll.exe
      MD5

      09b6c8f169567f8557b2d96d9f6d3644

      SHA1

      f37977654300daf97df6eea1235bac7ac706cc11

      SHA256

      b6c1e3eff87deab0b2b41040d22f74c3d824bffbd161f7248f51f3640ac7b590

      SHA512

      478839f9f93a4abb2d0e8e1c62f58c07839780631f1cdd8b288493967cdecf6e354603ad784f92e8b82425cb4868accdabb37f78cc6ea47d89ac5c1090fce5fa

    • C:\ProgramData\rundll.exe
      MD5

      09b6c8f169567f8557b2d96d9f6d3644

      SHA1

      f37977654300daf97df6eea1235bac7ac706cc11

      SHA256

      b6c1e3eff87deab0b2b41040d22f74c3d824bffbd161f7248f51f3640ac7b590

      SHA512

      478839f9f93a4abb2d0e8e1c62f58c07839780631f1cdd8b288493967cdecf6e354603ad784f92e8b82425cb4868accdabb37f78cc6ea47d89ac5c1090fce5fa

    • C:\ProgramData\rundll.exe
      MD5

      09b6c8f169567f8557b2d96d9f6d3644

      SHA1

      f37977654300daf97df6eea1235bac7ac706cc11

      SHA256

      b6c1e3eff87deab0b2b41040d22f74c3d824bffbd161f7248f51f3640ac7b590

      SHA512

      478839f9f93a4abb2d0e8e1c62f58c07839780631f1cdd8b288493967cdecf6e354603ad784f92e8b82425cb4868accdabb37f78cc6ea47d89ac5c1090fce5fa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1E698CCB2C296D265AC1A253974E09FD_507D8E76B9B181409C8E098B073B8415
      MD5

      6ebbb510377546e225f6685aaff2c218

      SHA1

      00f53a4aac745b22f226e0d7a23c264deed39dfc

      SHA256

      1d417324ee61821e9cf65cf397c541d67937e5b34fc476be67413c2fd9c0e935

      SHA512

      1b1041662485832706fec350eb882500d6bc4221e756cc6095edcc569787552c8dfb845f28eec7527bd3b3e1b61d4f4e9c686b94a690e1cd0673b437a1c17051

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5887976EDAA817EEF5159B09F6FCD000_0E203DEEA1CF4E1256C816BA0BCE2CC3
      MD5

      328190e54ce5fe85be2904207680b960

      SHA1

      8ba455a81ee3e7410995c09969c9f52c64b20172

      SHA256

      e0f9c4f6ba5abd77f44100af40b475a77e552d8340f6309f1e4af4974412fc17

      SHA512

      f8aa42bd149d10e1c80b2ce7d4714276eae20c9b59204e3c9edc8cfcba148656294ed8053339be1cd1f94c93a641cb4f528c88baf015c0613d87e488d691b52a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
      MD5

      1377bda4b7243db8b15c8f88b9b9119a

      SHA1

      dca610c35a8f761463e8b4019e59c9b4e59c7bd9

      SHA256

      4e83d08ba5d58cda55e0f163348b72d875eaf369c3065a7f16b6aa39157c36e1

      SHA512

      97b588ff5f4e4f94f375312e8bd1a1a7ec8bdca46f98791da47e7b4eda238a95c1ce4b3141164bae8fbaafa2c24de61a2914292140b3fe78ab7acee30176cd56

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
      MD5

      4daa63f1e1d59ae80936bd76cf9fa744

      SHA1

      0173e19a900bc4e8493514f47944241796740387

      SHA256

      c122ecc975b6c44ed6db67ec276e1c55f55aa8ce31e381d044c41ee8278eca27

      SHA512

      f2f738ac635a5392a54b47fd5993b763429c783336692b65251f783384e858b34b3279cbe4ec4b0c75e3285e22b24ce32fbcd234b2fca6904dab7248ff4e7513

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E698CCB2C296D265AC1A253974E09FD_507D8E76B9B181409C8E098B073B8415
      MD5

      46cb53a266e6d0d02d4a355398a41c32

      SHA1

      05029e0c6158eeb6125130250d05aa692ca99d9c

      SHA256

      d9db1826b051789755fe107973bb8ccde203b4c53ad76ed8d3e3ab68ba9e8ba5

      SHA512

      f8a3b3e78bd5849e3beff372ca945ff580a0c640f456753f731508002bca75285ce436d5d5dc33d0a580e03d8673bf479345a9f5e7455add55fe26fb73069861

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5887976EDAA817EEF5159B09F6FCD000_0E203DEEA1CF4E1256C816BA0BCE2CC3
      MD5

      3a67c7ac50738072f515f6d96cf46414

      SHA1

      f976bb0b0d7cb1cc83d4467caddcd5b2ffa5b71c

      SHA256

      5907449ae27a4ee3146f8df1d72d975c9a50c622728a0ae9e6ca8a43bae2c40f

      SHA512

      23caf9f257704b2aea42aafe8566478925c5216d388edab60288d47f0f93f583f85cf3cde43cde546e6722d756002be0860670d42b2a4044d4f0f05a70106afd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_EE9DB89C3D6A328B5FEAFF0ED3C77874
      MD5

      a45adc0d4402600296df916fd5388fe0

      SHA1

      2b67a8362f1bc55957dc3329ee2e7cfaa843a58b

      SHA256

      1d58878b7bcca95c29487cb04f552db9306791277cd61e5a71ed8f823b308d98

      SHA512

      87e5391b00101322680a89ecc98d6836de606d3bdd61b972db4a5f8bbcf1b678fa0cf6f0249e10d464b08ce7c8393d92ee13581a2545acb21e566f8c14518aed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      550ba5b28a2abfd106654016257ea56e

      SHA1

      68039d447f5100e74a88c66133659c300797b6bd

      SHA256

      bb7058de30c15606fabcb5b0d858d1c7fabb38da8edf3ced69a3c2337e5e897b

      SHA512

      8314c433ae0316232eef1fad158f0c796b6f3558bb2b66d695bfb2092cdfb1db46588ab1fbd8fe207fd62fc6bb302a97afa94e961642f71c65f539672ca23088

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
      MD5

      bfe5fd64053c6b906b2ed0e37149bc72

      SHA1

      e5c84d69c4eed1ad21ead3e759a93b8352d5bf17

      SHA256

      a6dbb90c66666134ca37649a665f087e1499d8b9171f94fdd816973263b8ee7f

      SHA512

      34609745955753a35ead2a9e4bd16cb7451f1f8665f84861c002236db868830fe690213ab2cb3f4e857ee8046c502d29dbfcb5022f125ac4084d2bc3030ad1e6

    • C:\Users\Admin\AppData\Local\Temp\Ydretslletspiru7\Outsingi7.exe
      MD5

      09b6c8f169567f8557b2d96d9f6d3644

      SHA1

      f37977654300daf97df6eea1235bac7ac706cc11

      SHA256

      b6c1e3eff87deab0b2b41040d22f74c3d824bffbd161f7248f51f3640ac7b590

      SHA512

      478839f9f93a4abb2d0e8e1c62f58c07839780631f1cdd8b288493967cdecf6e354603ad784f92e8b82425cb4868accdabb37f78cc6ea47d89ac5c1090fce5fa

    • C:\Users\Admin\AppData\Local\Temp\Ydretslletspiru7\Outsingi7.vbs
      MD5

      c814e9cd20864913ac2aba6eda254b80

      SHA1

      0e5ad1325bf6890548850b51faa6f99a618fa8ae

      SHA256

      94a6f90b3880c06ce3de5d782e722b1006c167138e94a50ba75b97aeeb27d167

      SHA512

      dd1acb2d6bc34da5df7bfc086c95b787ca681c11c259b022638ff9c023029bc78958b4e4e0e59e5dabb02cde2a435658b50b958bbe91c19cd9e64638df681c0e

    • \ProgramData\rundll.exe
      MD5

      09b6c8f169567f8557b2d96d9f6d3644

      SHA1

      f37977654300daf97df6eea1235bac7ac706cc11

      SHA256

      b6c1e3eff87deab0b2b41040d22f74c3d824bffbd161f7248f51f3640ac7b590

      SHA512

      478839f9f93a4abb2d0e8e1c62f58c07839780631f1cdd8b288493967cdecf6e354603ad784f92e8b82425cb4868accdabb37f78cc6ea47d89ac5c1090fce5fa

    • \ProgramData\rundll.exe
      MD5

      09b6c8f169567f8557b2d96d9f6d3644

      SHA1

      f37977654300daf97df6eea1235bac7ac706cc11

      SHA256

      b6c1e3eff87deab0b2b41040d22f74c3d824bffbd161f7248f51f3640ac7b590

      SHA512

      478839f9f93a4abb2d0e8e1c62f58c07839780631f1cdd8b288493967cdecf6e354603ad784f92e8b82425cb4868accdabb37f78cc6ea47d89ac5c1090fce5fa

    • memory/332-9-0x000007FEF63D0000-0x000007FEF664A000-memory.dmp
      Filesize

      2.5MB

    • memory/576-20-0x000000000040117C-mapping.dmp
    • memory/576-36-0x0000000000401000-0x00000000004FD000-memory.dmp
      Filesize

      1008KB

    • memory/576-22-0x00000000001B0000-0x00000000002B0000-memory.dmp
      Filesize

      1024KB

    • memory/792-5-0x00000000765E1000-0x00000000765E3000-memory.dmp
      Filesize

      8KB

    • memory/792-4-0x0000000000280000-0x000000000028E000-memory.dmp
      Filesize

      56KB

    • memory/816-12-0x0000000000000000-mapping.dmp
    • memory/1220-6-0x000000000040117C-mapping.dmp
    • memory/1220-7-0x00000000001B0000-0x00000000002B0000-memory.dmp
      Filesize

      1024KB

    • memory/1220-16-0x0000000000401000-0x00000000004FD000-memory.dmp
      Filesize

      1008KB

    • memory/1692-35-0x0000000000000000-mapping.dmp
    • memory/1692-37-0x00000000000B0000-0x00000000000B1000-memory.dmp
      Filesize

      4KB