Analysis

  • max time kernel
    4294222s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    29-03-2022 20:26

General

  • Target

    97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe

  • Size

    1.1MB

  • MD5

    1f27a3ecac5d0c549112fc03b10c552a

  • SHA1

    28064a66a5743d932d92ba19af6f8a123372a070

  • SHA256

    97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a

  • SHA512

    b4c6003a7eb5ac9baad09f16d9531e842513dcd5e1c322e11cc7a5688b4359943a2af0b89ed7486bfbc02b75a9b25aed67642ec60614f8338b615f88e4a4962e

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

shooter00hrs

C2

185.219.134.245:4782

Mutex

VNM_MUTEX_ZFDh9LaTbTmwqFwo3L

Attributes
  • encryption_key

    wGYjrQIx5abERLvzC8Zu

  • install_name

    windows chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    chrome Startup

  • subdirectory

    SubDir

Extracted

Family

warzonerat

C2

185.219.134.245:5200

Signatures

  • Contains code to disable Windows Defender 11 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 11 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 8 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe
    "C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Xuemegng.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
        "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Adds Run key to start application
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1364
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:1112
        • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1696
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:1992
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1764
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1468
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
            5⤵
              PID:1448
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\sLljIkBgJW8g.bat" "
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1520
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              5⤵
                PID:520
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 10 localhost
                5⤵
                • Runs ping.exe
                PID:1692
              • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
                "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1620
        • C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe
          "C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:600
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 600 -s 200
            3⤵
            • Program crash
            PID:1208

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

        Filesize

        534KB

        MD5

        3702c2b44a1d4877f4d1187be6c33958

        SHA1

        4755c7d9fb0582f94b8feb44be9d3c70031a0f33

        SHA256

        295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

        SHA512

        11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

      • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

        Filesize

        534KB

        MD5

        3702c2b44a1d4877f4d1187be6c33958

        SHA1

        4755c7d9fb0582f94b8feb44be9d3c70031a0f33

        SHA256

        295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

        SHA512

        11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

      • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

        Filesize

        534KB

        MD5

        3702c2b44a1d4877f4d1187be6c33958

        SHA1

        4755c7d9fb0582f94b8feb44be9d3c70031a0f33

        SHA256

        295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

        SHA512

        11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

      • C:\Users\Admin\AppData\Local\Temp\Xuemegng.vbs

        Filesize

        97B

        MD5

        21cf56d4b0a76046820523108fb676e0

        SHA1

        9535221712c50c9a3fa7e06efe5e1efc016f715d

        SHA256

        2f931374cab0f3601d1698f4943f8e4f83cbfc3efb478bf518091ab23642dbc3

        SHA512

        5c2238aece0a82b63a541142dcee3527e3d1baad206d3fb7c3d226fd99c26c1c2d5d4113584be08118316fd5d78c3f7aca2f3d0e957c87f76b92615a24601cd5

      • C:\Users\Admin\AppData\Local\Temp\sLljIkBgJW8g.bat

        Filesize

        206B

        MD5

        64fca5f1807b24f06b44f1292eb549d2

        SHA1

        3e1e062c7bc779d43af9824b7fb9aaa4b810c785

        SHA256

        67a827a8769ef12c11e618157ad0c617f720fac46c67be70a1ce85053d46276e

        SHA512

        345696c7451dd338b37d4108b817d661f2fb5052d7c84bb57acc039f1f95e7b1d01b61cc1bb7490611aae9ebcfa4c72ad18b1ce3c7b7b03a3b1d80eba4bf53bf

      • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

        Filesize

        534KB

        MD5

        3702c2b44a1d4877f4d1187be6c33958

        SHA1

        4755c7d9fb0582f94b8feb44be9d3c70031a0f33

        SHA256

        295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

        SHA512

        11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

      • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

        Filesize

        534KB

        MD5

        3702c2b44a1d4877f4d1187be6c33958

        SHA1

        4755c7d9fb0582f94b8feb44be9d3c70031a0f33

        SHA256

        295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

        SHA512

        11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

      • \Users\Admin\AppData\Local\Temp\$77-Venom.exe

        Filesize

        534KB

        MD5

        3702c2b44a1d4877f4d1187be6c33958

        SHA1

        4755c7d9fb0582f94b8feb44be9d3c70031a0f33

        SHA256

        295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

        SHA512

        11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

      • \Users\Admin\AppData\Local\Temp\$77-Venom.exe

        Filesize

        534KB

        MD5

        3702c2b44a1d4877f4d1187be6c33958

        SHA1

        4755c7d9fb0582f94b8feb44be9d3c70031a0f33

        SHA256

        295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

        SHA512

        11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

      • \Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

        Filesize

        534KB

        MD5

        3702c2b44a1d4877f4d1187be6c33958

        SHA1

        4755c7d9fb0582f94b8feb44be9d3c70031a0f33

        SHA256

        295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

        SHA512

        11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

      • memory/520-96-0x0000000000000000-mapping.dmp

      • memory/572-58-0x0000000075C41000-0x0000000075C43000-memory.dmp

        Filesize

        8KB

      • memory/572-56-0x0000000000000000-mapping.dmp

      • memory/600-70-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/600-79-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/600-71-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/600-73-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/600-74-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/600-75-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/600-76-0x0000000000405CE2-mapping.dmp

      • memory/600-68-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/600-65-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/600-66-0x0000000000400000-0x0000000000554000-memory.dmp

        Filesize

        1.3MB

      • memory/1088-54-0x0000000000D10000-0x0000000000E2E000-memory.dmp

        Filesize

        1.1MB

      • memory/1088-60-0x0000000000C80000-0x0000000000C9C000-memory.dmp

        Filesize

        112KB

      • memory/1088-55-0x0000000004430000-0x00000000044BC000-memory.dmp

        Filesize

        560KB

      • memory/1112-81-0x0000000000000000-mapping.dmp

      • memory/1208-80-0x0000000000000000-mapping.dmp

      • memory/1364-64-0x00000000008A0000-0x000000000092C000-memory.dmp

        Filesize

        560KB

      • memory/1364-62-0x0000000000000000-mapping.dmp

      • memory/1448-93-0x0000000000000000-mapping.dmp

      • memory/1468-92-0x0000000000000000-mapping.dmp

      • memory/1520-94-0x0000000000000000-mapping.dmp

      • memory/1620-101-0x0000000000D70000-0x0000000000DFC000-memory.dmp

        Filesize

        560KB

      • memory/1620-99-0x0000000000000000-mapping.dmp

      • memory/1692-97-0x0000000000000000-mapping.dmp

      • memory/1696-83-0x0000000000000000-mapping.dmp

      • memory/1696-86-0x00000000001B0000-0x000000000023C000-memory.dmp

        Filesize

        560KB

      • memory/1764-87-0x0000000000000000-mapping.dmp

      • memory/1764-91-0x00000000023B0000-0x0000000002FFA000-memory.dmp

        Filesize

        12.3MB

      • memory/1764-90-0x000000006EFD0000-0x000000006F57B000-memory.dmp

        Filesize

        5.7MB

      • memory/1992-89-0x0000000000000000-mapping.dmp