Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
28-10-2021 13:39
Static task
static1
Behavioral task
behavioral1
Sample
New Order.xls.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
New Order.xls.exe
Resource
win10-en-20211014
General
-
Target
New Order.xls.exe
-
Size
361KB
-
MD5
0f3af49aed9b20bc69abe9f3c5b36364
-
SHA1
73e825d30b8666d15b5d229e8a1f96c435bd8f9f
-
SHA256
396cf03c5637b57c3b391d5bb7b8c05fce62d23ee9df51f99669268c5be28742
-
SHA512
c70e515a227571eede0072316ce28180c8883c27ea469b6fb04101253b6e1b4a6e0ffb155c87a7a869f7aedeec7240ec1416f5f5b419612117e9ff7bba9f8274
Malware Config
Extracted
warzonerat
alliedofficewarz.ddns.net:6060
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3280-116-0x0000000000000000-mapping.dmp warzonerat behavioral2/memory/3280-117-0x0000000000450000-0x00000000005A4000-memory.dmp warzonerat behavioral2/memory/3280-122-0x0000000000450000-0x00000000005A4000-memory.dmp warzonerat behavioral2/memory/1280-131-0x0000000000000000-mapping.dmp warzonerat behavioral2/memory/1280-138-0x0000000000450000-0x00000000005A4000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
Processes:
images.exeimages.exepid process 1344 images.exe 1280 images.exe -
Loads dropped DLL 2 IoCs
Processes:
New Order.xls.exeimages.exepid process 3580 New Order.xls.exe 1344 images.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
New Order.xls.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" New Order.xls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
Processes:
resource yara_rule C:\ProgramData\images.exe nsis_installer_1 C:\ProgramData\images.exe nsis_installer_2 C:\ProgramData\images.exe nsis_installer_1 C:\ProgramData\images.exe nsis_installer_2 C:\ProgramData\images.exe nsis_installer_1 C:\ProgramData\images.exe nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 3936 powershell.exe 548 powershell.exe 3936 powershell.exe 548 powershell.exe 3936 powershell.exe 548 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 548 powershell.exe Token: SeDebugPrivilege 3936 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
New Order.xls.exeNew Order.xls.exeimages.exeimages.exedescription pid process target process PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3580 wrote to memory of 3280 3580 New Order.xls.exe New Order.xls.exe PID 3280 wrote to memory of 548 3280 New Order.xls.exe powershell.exe PID 3280 wrote to memory of 548 3280 New Order.xls.exe powershell.exe PID 3280 wrote to memory of 548 3280 New Order.xls.exe powershell.exe PID 3280 wrote to memory of 1344 3280 New Order.xls.exe images.exe PID 3280 wrote to memory of 1344 3280 New Order.xls.exe images.exe PID 3280 wrote to memory of 1344 3280 New Order.xls.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1344 wrote to memory of 1280 1344 images.exe images.exe PID 1280 wrote to memory of 3936 1280 images.exe powershell.exe PID 1280 wrote to memory of 3936 1280 images.exe powershell.exe PID 1280 wrote to memory of 3936 1280 images.exe powershell.exe PID 1280 wrote to memory of 2128 1280 images.exe cmd.exe PID 1280 wrote to memory of 2128 1280 images.exe cmd.exe PID 1280 wrote to memory of 2128 1280 images.exe cmd.exe PID 1280 wrote to memory of 2128 1280 images.exe cmd.exe PID 1280 wrote to memory of 2128 1280 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.xls.exe"C:\Users\Admin\AppData\Local\Temp\New Order.xls.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\New Order.xls.exe"C:\Users\Admin\AppData\Local\Temp\New Order.xls.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeMD5
0f3af49aed9b20bc69abe9f3c5b36364
SHA173e825d30b8666d15b5d229e8a1f96c435bd8f9f
SHA256396cf03c5637b57c3b391d5bb7b8c05fce62d23ee9df51f99669268c5be28742
SHA512c70e515a227571eede0072316ce28180c8883c27ea469b6fb04101253b6e1b4a6e0ffb155c87a7a869f7aedeec7240ec1416f5f5b419612117e9ff7bba9f8274
-
C:\ProgramData\images.exeMD5
0f3af49aed9b20bc69abe9f3c5b36364
SHA173e825d30b8666d15b5d229e8a1f96c435bd8f9f
SHA256396cf03c5637b57c3b391d5bb7b8c05fce62d23ee9df51f99669268c5be28742
SHA512c70e515a227571eede0072316ce28180c8883c27ea469b6fb04101253b6e1b4a6e0ffb155c87a7a869f7aedeec7240ec1416f5f5b419612117e9ff7bba9f8274
-
C:\ProgramData\images.exeMD5
0f3af49aed9b20bc69abe9f3c5b36364
SHA173e825d30b8666d15b5d229e8a1f96c435bd8f9f
SHA256396cf03c5637b57c3b391d5bb7b8c05fce62d23ee9df51f99669268c5be28742
SHA512c70e515a227571eede0072316ce28180c8883c27ea469b6fb04101253b6e1b4a6e0ffb155c87a7a869f7aedeec7240ec1416f5f5b419612117e9ff7bba9f8274
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
41436467643a7f0816825471f05a8e6c
SHA1f0df425123b8831a200cff896c6f3638c326cca5
SHA256b785dbc8e9ef4380a666ae229b0548ac4882078fcdf3198ec68faa4f454ccdd4
SHA512e66c81e6e1135863bafc0a7800ef588b67afc94e4d89420b950630d58dc57fd5a6cbcbda347a26500b40cee69abfa9f26eff9d5767a0b74a126f82ee30e6c653
-
C:\Users\Admin\AppData\Local\Temp\xs5zkg4aoo73MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\nsnBF4A.tmp\sczlg.dllMD5
050c40e88dc3bd1657dc0f35058a95ad
SHA1dcc74c0fbb382cf0eb0cc3177b17d9190635e753
SHA256b50a1bae00a83af133e834a25fd298f561aaf8d6f3b5e2d79622305afdeb6977
SHA5129e2e8e6e9c39a8af67cfa66fc4ada5f559f4e6e82abb45d8fc4e49b284fa2728fe205ba85705448e8a02bd802c0922b3d8edccfd0cb42c7273bef2bcd5b918c9
-
\Users\Admin\AppData\Local\Temp\nsyCD25.tmp\sczlg.dllMD5
050c40e88dc3bd1657dc0f35058a95ad
SHA1dcc74c0fbb382cf0eb0cc3177b17d9190635e753
SHA256b50a1bae00a83af133e834a25fd298f561aaf8d6f3b5e2d79622305afdeb6977
SHA5129e2e8e6e9c39a8af67cfa66fc4ada5f559f4e6e82abb45d8fc4e49b284fa2728fe205ba85705448e8a02bd802c0922b3d8edccfd0cb42c7273bef2bcd5b918c9
-
memory/548-160-0x0000000006B30000-0x0000000006B31000-memory.dmpFilesize
4KB
-
memory/548-167-0x0000000000A80000-0x0000000000A81000-memory.dmpFilesize
4KB
-
memory/548-130-0x0000000000A80000-0x0000000000A81000-memory.dmpFilesize
4KB
-
memory/548-129-0x0000000000A80000-0x0000000000A81000-memory.dmpFilesize
4KB
-
memory/548-211-0x0000000004523000-0x0000000004524000-memory.dmpFilesize
4KB
-
memory/548-123-0x0000000000000000-mapping.dmp
-
memory/548-187-0x000000007F500000-0x000000007F501000-memory.dmpFilesize
4KB
-
memory/548-139-0x0000000004430000-0x0000000004431000-memory.dmpFilesize
4KB
-
memory/548-140-0x0000000006F90000-0x0000000006F91000-memory.dmpFilesize
4KB
-
memory/548-142-0x0000000004522000-0x0000000004523000-memory.dmpFilesize
4KB
-
memory/548-141-0x0000000004520000-0x0000000004521000-memory.dmpFilesize
4KB
-
memory/548-180-0x0000000008F30000-0x0000000008F63000-memory.dmpFilesize
204KB
-
memory/548-151-0x00000000075C0000-0x00000000075C1000-memory.dmpFilesize
4KB
-
memory/1280-131-0x0000000000000000-mapping.dmp
-
memory/1280-138-0x0000000000450000-0x00000000005A4000-memory.dmpFilesize
1.3MB
-
memory/1344-124-0x0000000000000000-mapping.dmp
-
memory/2128-159-0x0000000000F90000-0x0000000000F91000-memory.dmpFilesize
4KB
-
memory/2128-147-0x0000000000000000-mapping.dmp
-
memory/3280-116-0x0000000000000000-mapping.dmp
-
memory/3280-117-0x0000000000450000-0x00000000005A4000-memory.dmpFilesize
1.3MB
-
memory/3280-122-0x0000000000450000-0x00000000005A4000-memory.dmpFilesize
1.3MB
-
memory/3936-162-0x0000000008410000-0x0000000008411000-memory.dmpFilesize
4KB
-
memory/3936-184-0x000000007F700000-0x000000007F701000-memory.dmpFilesize
4KB
-
memory/3936-145-0x0000000000E00000-0x0000000000E01000-memory.dmpFilesize
4KB
-
memory/3936-164-0x00000000082C0000-0x00000000082C1000-memory.dmpFilesize
4KB
-
memory/3936-155-0x0000000007C30000-0x0000000007C31000-memory.dmpFilesize
4KB
-
memory/3936-166-0x0000000000E00000-0x0000000000E01000-memory.dmpFilesize
4KB
-
memory/3936-143-0x0000000000000000-mapping.dmp
-
memory/3936-158-0x0000000006C02000-0x0000000006C03000-memory.dmpFilesize
4KB
-
memory/3936-157-0x0000000006C00000-0x0000000006C01000-memory.dmpFilesize
4KB
-
memory/3936-196-0x0000000009050000-0x0000000009051000-memory.dmpFilesize
4KB
-
memory/3936-208-0x0000000006C03000-0x0000000006C04000-memory.dmpFilesize
4KB
-
memory/3936-153-0x0000000007AF0000-0x0000000007AF1000-memory.dmpFilesize
4KB
-
memory/3936-144-0x0000000000E00000-0x0000000000E01000-memory.dmpFilesize
4KB
-
memory/3936-149-0x0000000007870000-0x0000000007871000-memory.dmpFilesize
4KB