Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
07-05-2021 11:59
Static task
static1
Behavioral task
behavioral1
Sample
nope.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
nope.exe
Resource
win10v20210410
General
-
Target
nope.exe
-
Size
323KB
-
MD5
05cb7c989fa115270895dbadf7598a1b
-
SHA1
cfa9ac127090cc5826a6e7b6e2b13cceb82ba751
-
SHA256
dbdfbca2dcc01a530cd7c449500dc0f6b564c11f9ed9dc8d746709a235d6826f
-
SHA512
849c96876d37043a95f828ac3587b2049c0217d826f07724330f6d8d9a613868ff79352da8b74078101796d2ddf62037544db8faa680bf77ebdbd6c034fbdca9
Malware Config
Extracted
warzonerat
149.28.124.150:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Executes dropped EXE 2 IoCs
Processes:
ph88AcgfPIO.exeimages.exepid process 580 ph88AcgfPIO.exe 1832 images.exe -
Loads dropped DLL 1 IoCs
Processes:
nope.exepid process 3560 nope.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ph88AcgfPIO.exeimages.exepid process 580 ph88AcgfPIO.exe 580 ph88AcgfPIO.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe 1832 images.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
nope.exeph88AcgfPIO.execmd.exedescription pid process target process PID 3560 wrote to memory of 580 3560 nope.exe ph88AcgfPIO.exe PID 3560 wrote to memory of 580 3560 nope.exe ph88AcgfPIO.exe PID 3560 wrote to memory of 580 3560 nope.exe ph88AcgfPIO.exe PID 580 wrote to memory of 3120 580 ph88AcgfPIO.exe Explorer.EXE PID 580 wrote to memory of 3120 580 ph88AcgfPIO.exe Explorer.EXE PID 580 wrote to memory of 1736 580 ph88AcgfPIO.exe cmd.exe PID 580 wrote to memory of 1736 580 ph88AcgfPIO.exe cmd.exe PID 580 wrote to memory of 1736 580 ph88AcgfPIO.exe cmd.exe PID 580 wrote to memory of 1832 580 ph88AcgfPIO.exe images.exe PID 580 wrote to memory of 1832 580 ph88AcgfPIO.exe images.exe PID 580 wrote to memory of 1832 580 ph88AcgfPIO.exe images.exe PID 1736 wrote to memory of 2288 1736 cmd.exe reg.exe PID 1736 wrote to memory of 2288 1736 cmd.exe reg.exe PID 1736 wrote to memory of 2288 1736 cmd.exe reg.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\nope.exe"C:\Users\Admin\AppData\Local\Temp\nope.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\ph88AcgfPIO.exe"C:\Users\Admin\Documents\ph88AcgfPIO.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"5⤵
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeMD5
49e8a6ee9c5dd808767d4753639bb045
SHA163739f2feff8d277d53b9af26df46c77d4088cf6
SHA2569cd6c84ba5aee64aca1a0e7d17839c3974b965efd4ab83cc0d1deb336793f590
SHA5128dc55930a566f6efcc365f8a8498aaf93ff609aa98acdbbaee3a4f9716d3da322615cc0366ffcf14b81fc6196b7f8cde982c8ba4d2df874d046db3060ab9af06
-
C:\ProgramData\images.exeMD5
49e8a6ee9c5dd808767d4753639bb045
SHA163739f2feff8d277d53b9af26df46c77d4088cf6
SHA2569cd6c84ba5aee64aca1a0e7d17839c3974b965efd4ab83cc0d1deb336793f590
SHA5128dc55930a566f6efcc365f8a8498aaf93ff609aa98acdbbaee3a4f9716d3da322615cc0366ffcf14b81fc6196b7f8cde982c8ba4d2df874d046db3060ab9af06
-
C:\Users\Admin\Documents\ph88AcgfPIO.exeMD5
49e8a6ee9c5dd808767d4753639bb045
SHA163739f2feff8d277d53b9af26df46c77d4088cf6
SHA2569cd6c84ba5aee64aca1a0e7d17839c3974b965efd4ab83cc0d1deb336793f590
SHA5128dc55930a566f6efcc365f8a8498aaf93ff609aa98acdbbaee3a4f9716d3da322615cc0366ffcf14b81fc6196b7f8cde982c8ba4d2df874d046db3060ab9af06
-
C:\Users\Admin\Documents\ph88AcgfPIO.exeMD5
49e8a6ee9c5dd808767d4753639bb045
SHA163739f2feff8d277d53b9af26df46c77d4088cf6
SHA2569cd6c84ba5aee64aca1a0e7d17839c3974b965efd4ab83cc0d1deb336793f590
SHA5128dc55930a566f6efcc365f8a8498aaf93ff609aa98acdbbaee3a4f9716d3da322615cc0366ffcf14b81fc6196b7f8cde982c8ba4d2df874d046db3060ab9af06
-
\Users\Admin\AppData\Local\Temp\6372a841-9f92-4355-be7d-f72f94928f4d\test.dllMD5
e8641f344213ca05d8b5264b5f4e2dee
SHA196729e31f9b805800b2248fd22a4b53e226c8309
SHA25685e82b9e9200e798e8f434459eacee03ed9818cc6c9a513fe083e72d48884e24
SHA5123130f32c100ecb97083ad8ac4c67863e9ceed3a9b06fc464d1aeeaec389f74c8bf56f4ce04f6450fd2cc0fa861d085101c433cfa4bec3095f8ebeeb53b739109
-
memory/580-119-0x0000000000000000-mapping.dmp
-
memory/1736-122-0x0000000000000000-mapping.dmp
-
memory/1832-123-0x0000000000000000-mapping.dmp
-
memory/2288-126-0x0000000000000000-mapping.dmp
-
memory/3560-114-0x0000000000010000-0x0000000000011000-memory.dmpFilesize
4KB
-
memory/3560-117-0x00007FF960E10000-0x00007FF960F3C000-memory.dmpFilesize
1.2MB
-
memory/3560-118-0x000000001AAB0000-0x000000001AAB2000-memory.dmpFilesize
8KB