Analysis
-
max time kernel
91s -
max time network
25s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
05-05-2021 01:58
Static task
static1
Behavioral task
behavioral1
Sample
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe
Resource
win10v20210410
General
-
Target
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe
-
Size
1.8MB
-
MD5
b9e4fdb4f1d1e50fb2b1bc6f8e648e91
-
SHA1
afe3e9370a5fb240ae917a9089fc07b6a54a7bd6
-
SHA256
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5
-
SHA512
ff4f45aca5c634e0e64623c8dd1e5521b502713166c5cc01699d3eef24b39e3ae7238d8afa61457c418d242cadb9505ba09a7b50cfac55cf5fa4855c7bdb2cad
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 7 IoCs
Processes:
resource yara_rule \Windows\system\explorer.exe warzonerat C:\Windows\system\explorer.exe warzonerat \Windows\system\explorer.exe warzonerat \??\c:\windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Temp\Disk.sys warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat C:\Windows\system\explorer.exe warzonerat -
Executes dropped EXE 2 IoCs
Processes:
explorer.exeexplorer.exepid process 1468 explorer.exe 1328 explorer.exe -
Loads dropped DLL 2 IoCs
Processes:
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exepid process 1716 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 1716 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exeexplorer.exedescription pid process target process PID 756 set thread context of 1716 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe PID 756 set thread context of 1264 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe diskperf.exe PID 1468 set thread context of 1328 1468 explorer.exe explorer.exe PID 1468 set thread context of 608 1468 explorer.exe diskperf.exe -
Drops file in Windows directory 1 IoCs
Processes:
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exepid process 1716 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exepid process 1716 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 1716 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exeexplorer.exedescription pid process target process PID 756 wrote to memory of 1716 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe PID 756 wrote to memory of 1716 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe PID 756 wrote to memory of 1716 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe PID 756 wrote to memory of 1716 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe PID 756 wrote to memory of 1716 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe PID 756 wrote to memory of 1716 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe PID 756 wrote to memory of 1716 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe PID 756 wrote to memory of 1716 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe PID 756 wrote to memory of 1716 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe PID 756 wrote to memory of 1264 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe diskperf.exe PID 756 wrote to memory of 1264 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe diskperf.exe PID 756 wrote to memory of 1264 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe diskperf.exe PID 756 wrote to memory of 1264 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe diskperf.exe PID 756 wrote to memory of 1264 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe diskperf.exe PID 756 wrote to memory of 1264 756 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe diskperf.exe PID 1716 wrote to memory of 1468 1716 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe explorer.exe PID 1716 wrote to memory of 1468 1716 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe explorer.exe PID 1716 wrote to memory of 1468 1716 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe explorer.exe PID 1716 wrote to memory of 1468 1716 33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe explorer.exe PID 1468 wrote to memory of 1328 1468 explorer.exe explorer.exe PID 1468 wrote to memory of 1328 1468 explorer.exe explorer.exe PID 1468 wrote to memory of 1328 1468 explorer.exe explorer.exe PID 1468 wrote to memory of 1328 1468 explorer.exe explorer.exe PID 1468 wrote to memory of 1328 1468 explorer.exe explorer.exe PID 1468 wrote to memory of 1328 1468 explorer.exe explorer.exe PID 1468 wrote to memory of 1328 1468 explorer.exe explorer.exe PID 1468 wrote to memory of 1328 1468 explorer.exe explorer.exe PID 1468 wrote to memory of 1328 1468 explorer.exe explorer.exe PID 1468 wrote to memory of 608 1468 explorer.exe diskperf.exe PID 1468 wrote to memory of 608 1468 explorer.exe diskperf.exe PID 1468 wrote to memory of 608 1468 explorer.exe diskperf.exe PID 1468 wrote to memory of 608 1468 explorer.exe diskperf.exe PID 1468 wrote to memory of 608 1468 explorer.exe diskperf.exe PID 1468 wrote to memory of 608 1468 explorer.exe diskperf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe"C:\Users\Admin\AppData\Local\Temp\33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe"C:\Users\Admin\AppData\Local\Temp\33be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exeMD5
b9e4fdb4f1d1e50fb2b1bc6f8e648e91
SHA1afe3e9370a5fb240ae917a9089fc07b6a54a7bd6
SHA25633be12e4978d894da637959e06d3d125923816ccdf52c644b5ebf24ab8ea06d5
SHA512ff4f45aca5c634e0e64623c8dd1e5521b502713166c5cc01699d3eef24b39e3ae7238d8afa61457c418d242cadb9505ba09a7b50cfac55cf5fa4855c7bdb2cad
-
C:\Users\Admin\AppData\Local\Temp\Disk.sysMD5
4f2a85631e64de0f0c79734020c219ed
SHA17477de7d243a12e36505dcc297c5f3d9d1b00de5
SHA2569c1614cff8128ac4d53fc18b6267ece8167dea8ec65fa4841fbb54a65e2e2d17
SHA5121ea331e91a170d2897d2d30fdbd7a2c3894db81d09b8126e149920a60514d567849b7df02637368418c91a21f944362159be29368c7b9d1d25182770b4143f14
-
C:\Windows\system\explorer.exeMD5
4f2a85631e64de0f0c79734020c219ed
SHA17477de7d243a12e36505dcc297c5f3d9d1b00de5
SHA2569c1614cff8128ac4d53fc18b6267ece8167dea8ec65fa4841fbb54a65e2e2d17
SHA5121ea331e91a170d2897d2d30fdbd7a2c3894db81d09b8126e149920a60514d567849b7df02637368418c91a21f944362159be29368c7b9d1d25182770b4143f14
-
C:\Windows\system\explorer.exeMD5
4f2a85631e64de0f0c79734020c219ed
SHA17477de7d243a12e36505dcc297c5f3d9d1b00de5
SHA2569c1614cff8128ac4d53fc18b6267ece8167dea8ec65fa4841fbb54a65e2e2d17
SHA5121ea331e91a170d2897d2d30fdbd7a2c3894db81d09b8126e149920a60514d567849b7df02637368418c91a21f944362159be29368c7b9d1d25182770b4143f14
-
\??\c:\windows\system\explorer.exeMD5
4f2a85631e64de0f0c79734020c219ed
SHA17477de7d243a12e36505dcc297c5f3d9d1b00de5
SHA2569c1614cff8128ac4d53fc18b6267ece8167dea8ec65fa4841fbb54a65e2e2d17
SHA5121ea331e91a170d2897d2d30fdbd7a2c3894db81d09b8126e149920a60514d567849b7df02637368418c91a21f944362159be29368c7b9d1d25182770b4143f14
-
\Windows\system\explorer.exeMD5
4f2a85631e64de0f0c79734020c219ed
SHA17477de7d243a12e36505dcc297c5f3d9d1b00de5
SHA2569c1614cff8128ac4d53fc18b6267ece8167dea8ec65fa4841fbb54a65e2e2d17
SHA5121ea331e91a170d2897d2d30fdbd7a2c3894db81d09b8126e149920a60514d567849b7df02637368418c91a21f944362159be29368c7b9d1d25182770b4143f14
-
\Windows\system\explorer.exeMD5
4f2a85631e64de0f0c79734020c219ed
SHA17477de7d243a12e36505dcc297c5f3d9d1b00de5
SHA2569c1614cff8128ac4d53fc18b6267ece8167dea8ec65fa4841fbb54a65e2e2d17
SHA5121ea331e91a170d2897d2d30fdbd7a2c3894db81d09b8126e149920a60514d567849b7df02637368418c91a21f944362159be29368c7b9d1d25182770b4143f14
-
memory/608-86-0x0000000000411000-mapping.dmp
-
memory/756-61-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/756-60-0x00000000750C1000-0x00000000750C3000-memory.dmpFilesize
8KB
-
memory/1264-66-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1264-72-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1264-67-0x0000000000411000-mapping.dmp
-
memory/1328-81-0x0000000000403670-mapping.dmp
-
memory/1468-75-0x0000000000000000-mapping.dmp
-
memory/1468-78-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1716-71-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1716-63-0x0000000000403670-mapping.dmp
-
memory/1716-62-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB