Analysis
-
max time kernel
120s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
02-12-2021 04:38
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe
Resource
win10-en-20211104
General
-
Target
SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe
-
Size
723KB
-
MD5
c344d65c21f6ea39c6be100c5e6cdd85
-
SHA1
86d8d6fd0753b356d2b9f434d0dd81c58e120738
-
SHA256
7ae5e02834e7219a820a9ce756d4ee8efe50c988bd8ed876800c7bbb6890c680
-
SHA512
9843fd943f86f228b73d905c69bc8ec4ad79866498dfcb38a14e9ebf662adbf70a04f7860f0f13a446fbf494594c3d518913b861bde8a96dcd4f527315b15de4
Malware Config
Extracted
warzonerat
emba.espielweinstein.pw:56056
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/880-57-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/880-58-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/880-60-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
Processes:
SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXEdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exedescription pid process target process PID 1648 set thread context of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exeSecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXEpid process 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe 880 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exedescription pid process target process PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE PID 1648 wrote to memory of 880 1648 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE -
outlook_office_path 1 IoCs
Processes:
SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXEdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE -
outlook_win_path 1 IoCs
Processes:
SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXEdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.__vbaHresultCheckObj.8709.4023.EXE"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/880-57-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/880-58-0x0000000000405CE2-mapping.dmp
-
memory/880-59-0x0000000075321000-0x0000000075323000-memory.dmpFilesize
8KB
-
memory/880-60-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/880-61-0x00000000039A0000-0x0000000003AA0000-memory.dmpFilesize
1024KB
-
memory/880-62-0x0000000003EA0000-0x0000000003F24000-memory.dmpFilesize
528KB
-
memory/1648-55-0x0000000000220000-0x0000000000226000-memory.dmpFilesize
24KB
-
memory/1648-56-0x0000000000220000-0x000000000022A000-memory.dmpFilesize
40KB