Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-01-2021 14:43

General

  • Target

    f8bb59b31d3c499175097b82261b76c7.exe

  • Size

    889KB

  • MD5

    f8bb59b31d3c499175097b82261b76c7

  • SHA1

    55e04ce47ec557644fd5090c6b8eca08fc40f5ac

  • SHA256

    697a598f8ed9e8d8ca308a2472e712420d116e48db95d4a0cd69495242f47e2f

  • SHA512

    751e84ea0c212714f17fc1e1a3a61bcd86bccf16986ccce7f77452f1f775f539facaa97adbce88b94af784ada6c44747244fd80b3c3262d2a371a83103415cc5

Malware Config

Extracted

Family

warzonerat

C2

79.134.225.79:5300

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8bb59b31d3c499175097b82261b76c7.exe
    "C:\Users\Admin\AppData\Local\Temp\f8bb59b31d3c499175097b82261b76c7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bgESXlmV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8FB2.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1188
    • C:\Users\Admin\AppData\Local\Temp\f8bb59b31d3c499175097b82261b76c7.exe
      "{path}"
      2⤵
        PID:1596
      • C:\Users\Admin\AppData\Local\Temp\f8bb59b31d3c499175097b82261b76c7.exe
        "{path}"
        2⤵
          PID:528
        • C:\Users\Admin\AppData\Local\Temp\f8bb59b31d3c499175097b82261b76c7.exe
          "{path}"
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:400
          • C:\ProgramData\images.exe
            "C:\ProgramData\images.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:912
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bgESXlmV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2C5E.tmp"
              4⤵
              • Creates scheduled task(s)
              PID:568
            • C:\ProgramData\images.exe
              "{path}"
              4⤵
              • Executes dropped EXE
              PID:824

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\images.exe

        MD5

        f8bb59b31d3c499175097b82261b76c7

        SHA1

        55e04ce47ec557644fd5090c6b8eca08fc40f5ac

        SHA256

        697a598f8ed9e8d8ca308a2472e712420d116e48db95d4a0cd69495242f47e2f

        SHA512

        751e84ea0c212714f17fc1e1a3a61bcd86bccf16986ccce7f77452f1f775f539facaa97adbce88b94af784ada6c44747244fd80b3c3262d2a371a83103415cc5

      • C:\ProgramData\images.exe

        MD5

        f8bb59b31d3c499175097b82261b76c7

        SHA1

        55e04ce47ec557644fd5090c6b8eca08fc40f5ac

        SHA256

        697a598f8ed9e8d8ca308a2472e712420d116e48db95d4a0cd69495242f47e2f

        SHA512

        751e84ea0c212714f17fc1e1a3a61bcd86bccf16986ccce7f77452f1f775f539facaa97adbce88b94af784ada6c44747244fd80b3c3262d2a371a83103415cc5

      • C:\ProgramData\images.exe

        MD5

        f8bb59b31d3c499175097b82261b76c7

        SHA1

        55e04ce47ec557644fd5090c6b8eca08fc40f5ac

        SHA256

        697a598f8ed9e8d8ca308a2472e712420d116e48db95d4a0cd69495242f47e2f

        SHA512

        751e84ea0c212714f17fc1e1a3a61bcd86bccf16986ccce7f77452f1f775f539facaa97adbce88b94af784ada6c44747244fd80b3c3262d2a371a83103415cc5

      • C:\Users\Admin\AppData\Local\Temp\tmp2C5E.tmp

        MD5

        d63fd1c6e5ef6d9706c70a57e47da543

        SHA1

        0d8029197903e3a7ab8d8eaf742e3ccc39341ff6

        SHA256

        ec83ce834d4a62ec71f86890416750a9bd35a03cfce7ad732b75f87f7ce25df8

        SHA512

        8ed943b5f1a212a1ece0f71b701f7a32c8ed54fdc2b0a0d8d879c3c0026069bb84ffce954f8d374286de0545dd89f4b1bfa74ce3430ce67497580807673926d9

      • C:\Users\Admin\AppData\Local\Temp\tmp8FB2.tmp

        MD5

        d63fd1c6e5ef6d9706c70a57e47da543

        SHA1

        0d8029197903e3a7ab8d8eaf742e3ccc39341ff6

        SHA256

        ec83ce834d4a62ec71f86890416750a9bd35a03cfce7ad732b75f87f7ce25df8

        SHA512

        8ed943b5f1a212a1ece0f71b701f7a32c8ed54fdc2b0a0d8d879c3c0026069bb84ffce954f8d374286de0545dd89f4b1bfa74ce3430ce67497580807673926d9

      • \ProgramData\images.exe

        MD5

        f8bb59b31d3c499175097b82261b76c7

        SHA1

        55e04ce47ec557644fd5090c6b8eca08fc40f5ac

        SHA256

        697a598f8ed9e8d8ca308a2472e712420d116e48db95d4a0cd69495242f47e2f

        SHA512

        751e84ea0c212714f17fc1e1a3a61bcd86bccf16986ccce7f77452f1f775f539facaa97adbce88b94af784ada6c44747244fd80b3c3262d2a371a83103415cc5

      • memory/400-12-0x00000000756A1000-0x00000000756A3000-memory.dmp

        Filesize

        8KB

      • memory/400-10-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/400-11-0x0000000000405CE2-mapping.dmp

      • memory/400-13-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/568-24-0x0000000000000000-mapping.dmp

      • memory/824-27-0x0000000000405CE2-mapping.dmp

      • memory/824-30-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/912-18-0x0000000073950000-0x000000007403E000-memory.dmp

        Filesize

        6.9MB

      • memory/912-15-0x0000000000000000-mapping.dmp

      • memory/912-19-0x0000000001240000-0x0000000001241000-memory.dmp

        Filesize

        4KB

      • memory/912-22-0x0000000000D20000-0x0000000000D21000-memory.dmp

        Filesize

        4KB

      • memory/1188-8-0x0000000000000000-mapping.dmp

      • memory/1684-2-0x0000000074670000-0x0000000074D5E000-memory.dmp

        Filesize

        6.9MB

      • memory/1684-7-0x00000000007B0000-0x00000000007EB000-memory.dmp

        Filesize

        236KB

      • memory/1684-6-0x00000000004C0000-0x00000000004CE000-memory.dmp

        Filesize

        56KB

      • memory/1684-5-0x0000000005110000-0x0000000005111000-memory.dmp

        Filesize

        4KB

      • memory/1684-3-0x0000000000100000-0x0000000000101000-memory.dmp

        Filesize

        4KB