Analysis

  • max time kernel
    120s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    02-12-2021 04:38

General

  • Target

    SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe

  • Size

    723KB

  • MD5

    c344d65c21f6ea39c6be100c5e6cdd85

  • SHA1

    86d8d6fd0753b356d2b9f434d0dd81c58e120738

  • SHA256

    7ae5e02834e7219a820a9ce756d4ee8efe50c988bd8ed876800c7bbb6890c680

  • SHA512

    9843fd943f86f228b73d905c69bc8ec4ad79866498dfcb38a14e9ebf662adbf70a04f7860f0f13a446fbf494594c3d518913b861bde8a96dcd4f527315b15de4

Malware Config

Extracted

Family

warzonerat

C2

emba.espielweinstein.pw:56056

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:880

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/880-57-0x0000000000400000-0x0000000000554000-memory.dmp
    Filesize

    1.3MB

  • memory/880-58-0x0000000000405CE2-mapping.dmp
  • memory/880-59-0x0000000075321000-0x0000000075323000-memory.dmp
    Filesize

    8KB

  • memory/880-60-0x0000000000400000-0x0000000000554000-memory.dmp
    Filesize

    1.3MB

  • memory/880-61-0x00000000039A0000-0x0000000003AA0000-memory.dmp
    Filesize

    1024KB

  • memory/880-62-0x0000000003EA0000-0x0000000003F24000-memory.dmp
    Filesize

    528KB

  • memory/1648-55-0x0000000000220000-0x0000000000226000-memory.dmp
    Filesize

    24KB

  • memory/1648-56-0x0000000000220000-0x000000000022A000-memory.dmp
    Filesize

    40KB