Analysis
-
max time kernel
109s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-06-2021 08:55
Static task
static1
Behavioral task
behavioral1
Sample
Scan_9281027361782_Swift_copy.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Scan_9281027361782_Swift_copy.exe
Resource
win10v20210408
General
-
Target
Scan_9281027361782_Swift_copy.exe
-
Size
19KB
-
MD5
d77a90d2fa369af90578e17feb4275ca
-
SHA1
349d9d02476721f6b89a721c523820e504918614
-
SHA256
2083d868972386aa9b3b423b6bba7ba92c65323b1d4dfea6f4cfa19435f26a4c
-
SHA512
c64b3663ed93fe8cd41ffd25ea4d8cff9d2e4e0845e60aa894d06c7679a662dfaac34c8d6d6e5dd3a106a20bf4b076826a840d7a28878e32c5cda270fe6bfc10
Malware Config
Extracted
warzonerat
136.144.41.4:4771
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Executes dropped EXE 2 IoCs
Processes:
Wsvicesss.exeNexus1.exepid process 3604 Wsvicesss.exe 3952 Nexus1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Wsvicesss.exedescription pid process target process PID 3604 set thread context of 1304 3604 Wsvicesss.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Scan_9281027361782_Swift_copy.exeWsvicesss.exepowershell.exepid process 624 Scan_9281027361782_Swift_copy.exe 3604 Wsvicesss.exe 3604 Wsvicesss.exe 2120 powershell.exe 2120 powershell.exe 2120 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Scan_9281027361782_Swift_copy.exeWsvicesss.exepowershell.exedescription pid process Token: SeDebugPrivilege 624 Scan_9281027361782_Swift_copy.exe Token: SeDebugPrivilege 3604 Wsvicesss.exe Token: SeDebugPrivilege 2120 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
Scan_9281027361782_Swift_copy.exeWsvicesss.exeRegSvcs.exedescription pid process target process PID 624 wrote to memory of 3604 624 Scan_9281027361782_Swift_copy.exe Wsvicesss.exe PID 624 wrote to memory of 3604 624 Scan_9281027361782_Swift_copy.exe Wsvicesss.exe PID 624 wrote to memory of 3604 624 Scan_9281027361782_Swift_copy.exe Wsvicesss.exe PID 3604 wrote to memory of 1504 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1504 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1504 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1304 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1304 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1304 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1304 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1304 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1304 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1304 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1304 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1304 3604 Wsvicesss.exe RegSvcs.exe PID 3604 wrote to memory of 1304 3604 Wsvicesss.exe RegSvcs.exe PID 1304 wrote to memory of 2120 1304 RegSvcs.exe powershell.exe PID 1304 wrote to memory of 2120 1304 RegSvcs.exe powershell.exe PID 1304 wrote to memory of 2120 1304 RegSvcs.exe powershell.exe PID 1304 wrote to memory of 3952 1304 RegSvcs.exe Nexus1.exe PID 1304 wrote to memory of 3952 1304 RegSvcs.exe Nexus1.exe PID 1304 wrote to memory of 3952 1304 RegSvcs.exe Nexus1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scan_9281027361782_Swift_copy.exe"C:\Users\Admin\AppData\Local\Temp\Scan_9281027361782_Swift_copy.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Wsvicesss.exe"C:\Users\Admin\AppData\Local\Temp\Wsvicesss.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1504
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\ProgramData\Nexus1.exe"C:\ProgramData\Nexus1.exe"4⤵
- Executes dropped EXE
PID:3952
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215
-
MD5
0e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215
-
MD5
02c8672818a779913d9b6a471695c293
SHA182cbe1fb837e2e2c7428f4de537dc83aef23a7fb
SHA256f03fc074a84b772598d69da16f2d8df348a1428c5cd0b012cf60b29914872e32
SHA5126dd17e889ed8d3ef87e90d382ac9e366070ad87094073984bbcf317c637933808b332bde233e05e3e4fbea7a11719bc993f6f85cec46857e4b6458f99faad0e4
-
MD5
02c8672818a779913d9b6a471695c293
SHA182cbe1fb837e2e2c7428f4de537dc83aef23a7fb
SHA256f03fc074a84b772598d69da16f2d8df348a1428c5cd0b012cf60b29914872e32
SHA5126dd17e889ed8d3ef87e90d382ac9e366070ad87094073984bbcf317c637933808b332bde233e05e3e4fbea7a11719bc993f6f85cec46857e4b6458f99faad0e4