Resubmissions
23-02-2021 11:33
210223-3xnxq2mccs 10Analysis
-
max time kernel
112s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
23-02-2021 11:33
Static task
static1
Behavioral task
behavioral1
Sample
Swift copy .xls.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Swift copy .xls.exe
Resource
win10v20201028
General
-
Target
Swift copy .xls.exe
-
Size
360KB
-
MD5
21f7a17e1a7bf3ea8e5b77beec1dd94f
-
SHA1
d6d0529b2bc4b8ed2c10d4c0e0730cd90421a744
-
SHA256
f1a7b6a46915fa2b34597413808c3f79379961e645ec613ec09dd0cd0a8722f0
-
SHA512
26a3dbdfae0007a8bcda397ad87d289cc1bd883f69e76cef67b2826069f183fac2e1e7273dbb58edefa7f70ce26e34241e4f70332e68964ad7170b9f228d4ec3
Malware Config
Extracted
warzonerat
194.5.97.116:1360
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1444-14-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1444-15-0x0000000000405CE2-mapping.dmp warzonerat behavioral2/memory/1444-16-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Sets DLL path for service in the registry 2 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 3780 svchost.exe -
Modifies WinLogon 2 TTPs 4 IoCs
Processes:
Swift copy .xls.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList Swift copy .xls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts Swift copy .xls.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\Bvubksk = "0" Swift copy .xls.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" Swift copy .xls.exe -
Drops file in System32 directory 2 IoCs
Processes:
Swift copy .xls.exedescription ioc process File created C:\Windows\System32\rfxvmt.dll Swift copy .xls.exe File opened for modification C:\Windows\System32\rfxvmt.dll Swift copy .xls.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Swift copy .xls.exedescription pid process target process PID 1176 set thread context of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe -
Drops file in Program Files directory 2 IoCs
Processes:
Swift copy .xls.exedescription ioc process File created C:\Program Files\Microsoft DN1\sqlmap.dll Swift copy .xls.exe File created C:\Program Files\Microsoft DN1\rdpwrap.ini Swift copy .xls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Swift copy .xls.exesvchost.exepid process 1176 Swift copy .xls.exe 1176 Swift copy .xls.exe 1176 Swift copy .xls.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe 3780 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 620 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Swift copy .xls.exeSwift copy .xls.exesvchost.exedescription pid process Token: SeDebugPrivilege 1176 Swift copy .xls.exe Token: SeDebugPrivilege 1444 Swift copy .xls.exe Token: SeAuditPrivilege 3780 svchost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Swift copy .xls.exedescription pid process target process PID 1176 wrote to memory of 2796 1176 Swift copy .xls.exe schtasks.exe PID 1176 wrote to memory of 2796 1176 Swift copy .xls.exe schtasks.exe PID 1176 wrote to memory of 2796 1176 Swift copy .xls.exe schtasks.exe PID 1176 wrote to memory of 3420 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 3420 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 3420 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe PID 1176 wrote to memory of 1444 1176 Swift copy .xls.exe Swift copy .xls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Swift copy .xls.exe"C:\Users\Admin\AppData\Local\Temp\Swift copy .xls.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AsLvNjC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE3CE.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Swift copy .xls.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Swift copy .xls.exe"{path}"2⤵
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s TermService1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpE3CE.tmpMD5
e56bba58443fec352a5d56e208b4a261
SHA16f42d1067a80f66aa80253abd51949e24669179c
SHA2568a3ea8c29c6e7e506dc45c387e2590dae03336899a125f97d0b37817744e8476
SHA5122aa6f7648cf31d22e9f5afd2e92d34a87fd6e450397b0c246c5a9351ef9bf3b662f3293cce3d6ffba6c8c4db2f93f4e0f26668d659316f14c56f5b697cffd35f
-
\??\c:\program files\microsoft dn1\rdpwrap.iniMD5
6bc395161b04aa555d5a4e8eb8320020
SHA1f18544faa4bd067f6773a373d580e111b0c8c300
SHA25623390dfcda60f292ba1e52abb5ba2f829335351f4f9b1d33a9a6ad7a9bf5e2be
SHA512679ac80c26422667ca5f2a6d9f0e022ef76bc9b09f97ad390b81f2e286446f0658524ccc8346a6e79d10e42131bc428f7c0ce4541d44d83af8134c499436daae
-
\??\c:\program files\microsoft dn1\sqlmap.dllMD5
461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26
-
\Program Files\Microsoft DN1\sqlmap.dllMD5
461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26
-
memory/1176-11-0x0000000006E30000-0x0000000006E78000-memory.dmpFilesize
288KB
-
memory/1176-6-0x0000000004A80000-0x0000000004A81000-memory.dmpFilesize
4KB
-
memory/1176-9-0x0000000006AF0000-0x0000000006AF1000-memory.dmpFilesize
4KB
-
memory/1176-10-0x0000000004D70000-0x0000000004D7B000-memory.dmpFilesize
44KB
-
memory/1176-2-0x0000000073A80000-0x000000007416E000-memory.dmpFilesize
6.9MB
-
memory/1176-3-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/1176-7-0x0000000002690000-0x0000000002691000-memory.dmpFilesize
4KB
-
memory/1176-5-0x00000000050D0000-0x00000000050D1000-memory.dmpFilesize
4KB
-
memory/1176-8-0x00000000026C0000-0x00000000026C1000-memory.dmpFilesize
4KB
-
memory/1444-16-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1444-15-0x0000000000405CE2-mapping.dmp
-
memory/1444-14-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1444-20-0x0000000003F70000-0x0000000003FF4000-memory.dmpFilesize
528KB
-
memory/2796-12-0x0000000000000000-mapping.dmp