Analysis
-
max time kernel
80s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
03-06-2021 16:57
Static task
static1
Behavioral task
behavioral1
Sample
a24fc1476d5da0d06ebcb6924a02bb18.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
a24fc1476d5da0d06ebcb6924a02bb18.exe
Resource
win10v20210408
General
-
Target
a24fc1476d5da0d06ebcb6924a02bb18.exe
-
Size
1.1MB
-
MD5
a24fc1476d5da0d06ebcb6924a02bb18
-
SHA1
ad06b3b5025b8dc5bfbfbe01de15ea2d7898c64c
-
SHA256
b7ef9f5137720932895dbc0e1231e71451eace1e82f2baac3e208c969ec1e966
-
SHA512
c98b0a8b0eace12738f8428dad05211620818458b4c4ddbfb2670714ceafc27ef36b38f0df9707f77197d002c0a1c4ff53fafcd780f3b938c60c932a82cdd2c5
Malware Config
Extracted
remcos
1.7 Pro
HostUniversal
bressonseencrounder.mangospot.net:1984
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Office
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
revsr_bwssxphqkv
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
- take_screenshot_title
Extracted
warzonerat
seencroundercontroller.webredirect.org:1894
Extracted
nanocore
1.2.2.0
multipleentry90dayscontroller.homingbeacon.net:54980
universalchampionis.zapto.org:54980
44548f7d-2f32-414e-b70b-1138f528266a
-
activate_away_mode
true
-
backup_connection_host
universalchampionis.zapto.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-03-09T23:47:26.614623836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
54980
-
default_group
Basi@Manager
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
44548f7d-2f32-414e-b70b-1138f528266a
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
multipleentry90dayscontroller.homingbeacon.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 2 IoCs
Processes:
resource yara_rule C:\Windows\firefox\Outlook w.exe warzonerat C:\Windows\firefox\Outlook w.exe warzonerat -
Executes dropped EXE 7 IoCs
Processes:
firefox.exeOutlook w.exeskype n.exefirefoxxx.exefirefoxxx.exefirefoxxxx.exefirefoxxxx.exepid process 808 firefox.exe 1568 Outlook w.exe 2280 skype n.exe 3848 firefoxxx.exe 2104 firefoxxx.exe 996 firefoxxxx.exe 860 firefoxxxx.exe -
Drops startup file 3 IoCs
Processes:
a24fc1476d5da0d06ebcb6924a02bb18.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxxx.lnk a24fc1476d5da0d06ebcb6924a02bb18.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe a24fc1476d5da0d06ebcb6924a02bb18.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe a24fc1476d5da0d06ebcb6924a02bb18.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/856-122-0x00000000063A0000-0x00000000063C1000-memory.dmp agile_net -
Processes:
skype n.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA skype n.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
firefoxxx.exedescription pid process target process PID 3848 set thread context of 2104 3848 firefoxxx.exe firefoxxx.exe -
Drops file in Windows directory 1 IoCs
Processes:
a24fc1476d5da0d06ebcb6924a02bb18.exedescription ioc process File created C:\Windows\firefox\Outlook w.exe a24fc1476d5da0d06ebcb6924a02bb18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
a24fc1476d5da0d06ebcb6924a02bb18.exeskype n.exefirefoxxx.exefirefoxxxx.exefirefoxxxx.exepid process 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 856 a24fc1476d5da0d06ebcb6924a02bb18.exe 2280 skype n.exe 2280 skype n.exe 2280 skype n.exe 2280 skype n.exe 2280 skype n.exe 2280 skype n.exe 3848 firefoxxx.exe 3848 firefoxxx.exe 3848 firefoxxx.exe 3848 firefoxxx.exe 996 firefoxxxx.exe 860 firefoxxxx.exe 860 firefoxxxx.exe 860 firefoxxxx.exe 3848 firefoxxx.exe 3848 firefoxxx.exe 3848 firefoxxx.exe 3848 firefoxxx.exe 3848 firefoxxx.exe 3848 firefoxxx.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
skype n.exefirefoxxx.exepid process 2280 skype n.exe 2104 firefoxxx.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
a24fc1476d5da0d06ebcb6924a02bb18.exeskype n.exefirefoxxx.exefirefoxxx.exefirefoxxxx.exefirefoxxxx.exedescription pid process Token: SeDebugPrivilege 856 a24fc1476d5da0d06ebcb6924a02bb18.exe Token: SeDebugPrivilege 2280 skype n.exe Token: SeDebugPrivilege 3848 firefoxxx.exe Token: SeDebugPrivilege 2104 firefoxxx.exe Token: SeDebugPrivilege 996 firefoxxxx.exe Token: SeDebugPrivilege 860 firefoxxxx.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
firefox.exeOutlook w.exefirefoxxx.exepid process 808 firefox.exe 1568 Outlook w.exe 2104 firefoxxx.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
a24fc1476d5da0d06ebcb6924a02bb18.exefirefoxxx.exefirefoxxxx.exedescription pid process target process PID 856 wrote to memory of 808 856 a24fc1476d5da0d06ebcb6924a02bb18.exe firefox.exe PID 856 wrote to memory of 808 856 a24fc1476d5da0d06ebcb6924a02bb18.exe firefox.exe PID 856 wrote to memory of 808 856 a24fc1476d5da0d06ebcb6924a02bb18.exe firefox.exe PID 856 wrote to memory of 1568 856 a24fc1476d5da0d06ebcb6924a02bb18.exe Outlook w.exe PID 856 wrote to memory of 1568 856 a24fc1476d5da0d06ebcb6924a02bb18.exe Outlook w.exe PID 856 wrote to memory of 1568 856 a24fc1476d5da0d06ebcb6924a02bb18.exe Outlook w.exe PID 856 wrote to memory of 2280 856 a24fc1476d5da0d06ebcb6924a02bb18.exe skype n.exe PID 856 wrote to memory of 2280 856 a24fc1476d5da0d06ebcb6924a02bb18.exe skype n.exe PID 856 wrote to memory of 2280 856 a24fc1476d5da0d06ebcb6924a02bb18.exe skype n.exe PID 856 wrote to memory of 3848 856 a24fc1476d5da0d06ebcb6924a02bb18.exe firefoxxx.exe PID 856 wrote to memory of 3848 856 a24fc1476d5da0d06ebcb6924a02bb18.exe firefoxxx.exe PID 856 wrote to memory of 3848 856 a24fc1476d5da0d06ebcb6924a02bb18.exe firefoxxx.exe PID 3848 wrote to memory of 2104 3848 firefoxxx.exe firefoxxx.exe PID 3848 wrote to memory of 2104 3848 firefoxxx.exe firefoxxx.exe PID 3848 wrote to memory of 2104 3848 firefoxxx.exe firefoxxx.exe PID 3848 wrote to memory of 2104 3848 firefoxxx.exe firefoxxx.exe PID 3848 wrote to memory of 2104 3848 firefoxxx.exe firefoxxx.exe PID 3848 wrote to memory of 2104 3848 firefoxxx.exe firefoxxx.exe PID 3848 wrote to memory of 2104 3848 firefoxxx.exe firefoxxx.exe PID 3848 wrote to memory of 2104 3848 firefoxxx.exe firefoxxx.exe PID 3848 wrote to memory of 996 3848 firefoxxx.exe firefoxxxx.exe PID 3848 wrote to memory of 996 3848 firefoxxx.exe firefoxxxx.exe PID 3848 wrote to memory of 996 3848 firefoxxx.exe firefoxxxx.exe PID 996 wrote to memory of 860 996 firefoxxxx.exe firefoxxxx.exe PID 996 wrote to memory of 860 996 firefoxxxx.exe firefoxxxx.exe PID 996 wrote to memory of 860 996 firefoxxxx.exe firefoxxxx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a24fc1476d5da0d06ebcb6924a02bb18.exe"C:\Users\Admin\AppData\Local\Temp\a24fc1476d5da0d06ebcb6924a02bb18.exe"1⤵
- Drops startup file
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\notepadnote\firefox.exe"C:\Users\Admin\AppData\Local\notepadnote\firefox.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:808
-
-
C:\Windows\firefox\Outlook w.exe"C:\Windows\firefox\Outlook w.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
C:\Users\Admin\AppData\Local\skype\skype n.exe"C:\Users\Admin\AppData\Local\skype\skype n.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\firefoxx\firefoxxx.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe"C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe"C:\Users\Admin\AppData\Local\Temp\firefoxxxx.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
MD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
MD5
0e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
MD5
4c25911a9183162c7e25a74fc953fa5e
SHA185acfc6e31cb1bf5df5f7789c231fc6541f91d7e
SHA256d1c665e55c5ce697c992fee27fa7f9d4890c0bc7ea2da612b77e0c2a92e593cc
SHA5122efb2c2d56f2b0d09753d175419569bdacf7ccb9d36a89aa2de633f06e6085a6b7d8c513ae10d8af7e438f4b7c410d42b816db6a3fd3a2db6967891ab47cffeb
-
MD5
4fbf938077e27075c22334ed3b24917f
SHA16a7044ea842947687ed9a9dda157cd348e82b366
SHA256b468f2d9229bdc9dc83a04e0464196024e74a810e106f0b7f58ee21d672b2550
SHA51279e8eecb456594ee7a60dfe21cf23006dae0d6b016fa9c6344cf9c4a0d2c815c524b688a4f5066d3e02316db7f232ce25edaba2551103d1207e2529cfb2bf122
-
MD5
a3ae9b593341a98f8bd5df47fc70c5c4
SHA1aac28e3cff2923f80467516bb49ef62009205fe1
SHA25627e12be1bc0fdea1355f9c2f67919db0eea4e76ecc81a131c2dae9151f6273c5
SHA51220a94b47e2f970b3be4f1765c359f61f9ca8168bd3888dba94cc3f29c3bef58e7c9049fff4c4494e8d00969555d8b224a360103f129c077cac4d5a050e4641d6
-
MD5
aeb7a2e7337a13a908467c3bed338793
SHA16bd27610a281b5e6d2b68e3fcce4d5430d11df9d
SHA256820e12af8f79fb8a108b80eea3bcf26dcc5d31c2c79072ee3cfceba1b22e355f
SHA5128770e6c6059761a1be3af01fbecbc8668f5471bc74f6dd05838aebb7380a4725db50a4309d2ca8fee1a08ebb6876a6d71ddb3a48a24e6623b047c759288337e7
-
MD5
aeb7a2e7337a13a908467c3bed338793
SHA16bd27610a281b5e6d2b68e3fcce4d5430d11df9d
SHA256820e12af8f79fb8a108b80eea3bcf26dcc5d31c2c79072ee3cfceba1b22e355f
SHA5128770e6c6059761a1be3af01fbecbc8668f5471bc74f6dd05838aebb7380a4725db50a4309d2ca8fee1a08ebb6876a6d71ddb3a48a24e6623b047c759288337e7
-
MD5
1297bfced52ab967d26578f733c0fc27
SHA10267ac0ceefbbf81d6411c17e886f98a7e9fb04d
SHA256acc69ae8822c6facb03542af4fcca5588408b41d351f7bc7988d462a7f8c60d2
SHA512beb4047e1792dd2be37d4e4e76cb1e14e36ed6aceb8452acc8d9da48d430539072c9d14d7afb55772e96ed9215d6643285de20637c97136acc2598c702f97a82
-
MD5
1297bfced52ab967d26578f733c0fc27
SHA10267ac0ceefbbf81d6411c17e886f98a7e9fb04d
SHA256acc69ae8822c6facb03542af4fcca5588408b41d351f7bc7988d462a7f8c60d2
SHA512beb4047e1792dd2be37d4e4e76cb1e14e36ed6aceb8452acc8d9da48d430539072c9d14d7afb55772e96ed9215d6643285de20637c97136acc2598c702f97a82
-
MD5
a24fc1476d5da0d06ebcb6924a02bb18
SHA1ad06b3b5025b8dc5bfbfbe01de15ea2d7898c64c
SHA256b7ef9f5137720932895dbc0e1231e71451eace1e82f2baac3e208c969ec1e966
SHA512c98b0a8b0eace12738f8428dad05211620818458b4c4ddbfb2670714ceafc27ef36b38f0df9707f77197d002c0a1c4ff53fafcd780f3b938c60c932a82cdd2c5
-
MD5
a24fc1476d5da0d06ebcb6924a02bb18
SHA1ad06b3b5025b8dc5bfbfbe01de15ea2d7898c64c
SHA256b7ef9f5137720932895dbc0e1231e71451eace1e82f2baac3e208c969ec1e966
SHA512c98b0a8b0eace12738f8428dad05211620818458b4c4ddbfb2670714ceafc27ef36b38f0df9707f77197d002c0a1c4ff53fafcd780f3b938c60c932a82cdd2c5
-
MD5
a24fc1476d5da0d06ebcb6924a02bb18
SHA1ad06b3b5025b8dc5bfbfbe01de15ea2d7898c64c
SHA256b7ef9f5137720932895dbc0e1231e71451eace1e82f2baac3e208c969ec1e966
SHA512c98b0a8b0eace12738f8428dad05211620818458b4c4ddbfb2670714ceafc27ef36b38f0df9707f77197d002c0a1c4ff53fafcd780f3b938c60c932a82cdd2c5
-
MD5
e46ec8afa834fa878bd2476fa357ed4f
SHA187d9cbed84df8f33167a0250f4f7f9e1e3c02fa0
SHA2562b21124d1683a0732c14190ec17c0aba4d33e3e00567607d8f7b7ed9754305b5
SHA512852675255511626b5d63b7b2c1115c710a27eab30d9e0f23edd4d44c471b08bcd01a95799e7f3bd89ff0afc976af52771cda58ccbd6b438788c9095d476637b9
-
MD5
e46ec8afa834fa878bd2476fa357ed4f
SHA187d9cbed84df8f33167a0250f4f7f9e1e3c02fa0
SHA2562b21124d1683a0732c14190ec17c0aba4d33e3e00567607d8f7b7ed9754305b5
SHA512852675255511626b5d63b7b2c1115c710a27eab30d9e0f23edd4d44c471b08bcd01a95799e7f3bd89ff0afc976af52771cda58ccbd6b438788c9095d476637b9