Analysis

  • max time kernel
    164s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    29-03-2022 20:26

General

  • Target

    97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe

  • Size

    1.1MB

  • MD5

    1f27a3ecac5d0c549112fc03b10c552a

  • SHA1

    28064a66a5743d932d92ba19af6f8a123372a070

  • SHA256

    97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a

  • SHA512

    b4c6003a7eb5ac9baad09f16d9531e842513dcd5e1c322e11cc7a5688b4359943a2af0b89ed7486bfbc02b75a9b25aed67642ec60614f8338b615f88e4a4962e

Malware Config

Extracted

Family

warzonerat

C2

185.219.134.245:5200

Extracted

Family

quasar

Version

2.1.0.0

Botnet

shooter00hrs

C2

185.219.134.245:4782

Mutex

VNM_MUTEX_ZFDh9LaTbTmwqFwo3L

Attributes
  • encryption_key

    wGYjrQIx5abERLvzC8Zu

  • install_name

    windows chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    chrome Startup

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 6 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 6 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe
    "C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Xuemegng.vbs"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
        "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4620
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:4232
        • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3392
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:4352
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4808
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:516
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
            5⤵
              PID:5060
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\a27IXjx7Obex.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2192
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              5⤵
                PID:4688
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 10 localhost
                5⤵
                • Runs ping.exe
                PID:3684
              • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
                "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:512
        • C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe
          "C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe"
          2⤵
            PID:4748
          • C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe
            "C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe"
            2⤵
              PID:4732
            • C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe
              "C:\Users\Admin\AppData\Local\Temp\97e297691930f3a5fc04b5e46f4ffdac7b13a781f1629da71f38824ee935af9a.exe"
              2⤵
                PID:1680
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 520
                  3⤵
                  • Program crash
                  PID:3760
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1680 -ip 1680
              1⤵
                PID:4856

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\$77-Venom.exe.log

                Filesize

                1KB

                MD5

                10eab9c2684febb5327b6976f2047587

                SHA1

                a12ed54146a7f5c4c580416aecb899549712449e

                SHA256

                f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

                SHA512

                7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

              • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

                Filesize

                534KB

                MD5

                3702c2b44a1d4877f4d1187be6c33958

                SHA1

                4755c7d9fb0582f94b8feb44be9d3c70031a0f33

                SHA256

                295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

                SHA512

                11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

              • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

                Filesize

                534KB

                MD5

                3702c2b44a1d4877f4d1187be6c33958

                SHA1

                4755c7d9fb0582f94b8feb44be9d3c70031a0f33

                SHA256

                295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

                SHA512

                11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

              • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

                Filesize

                534KB

                MD5

                3702c2b44a1d4877f4d1187be6c33958

                SHA1

                4755c7d9fb0582f94b8feb44be9d3c70031a0f33

                SHA256

                295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

                SHA512

                11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

              • C:\Users\Admin\AppData\Local\Temp\Xuemegng.vbs

                Filesize

                97B

                MD5

                21cf56d4b0a76046820523108fb676e0

                SHA1

                9535221712c50c9a3fa7e06efe5e1efc016f715d

                SHA256

                2f931374cab0f3601d1698f4943f8e4f83cbfc3efb478bf518091ab23642dbc3

                SHA512

                5c2238aece0a82b63a541142dcee3527e3d1baad206d3fb7c3d226fd99c26c1c2d5d4113584be08118316fd5d78c3f7aca2f3d0e957c87f76b92615a24601cd5

              • C:\Users\Admin\AppData\Local\Temp\a27IXjx7Obex.bat

                Filesize

                206B

                MD5

                c5455375f3a60028f0f02aeeae3b1d8b

                SHA1

                f97d638a00825b4eebb0c94fccb232681648f42a

                SHA256

                c3998fb8e6fca2ecdfce8c9450e430374d713f552a86345e17bd842018d6fe8c

                SHA512

                d6821a21e1ce31ea16b77a5e69e3b46b15f003699ac2d61486962c88318c96bf610766e8caedbc09676abcc6aae1e21c520249f7f9b79a6345c12c64a178d1e0

              • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

                Filesize

                534KB

                MD5

                3702c2b44a1d4877f4d1187be6c33958

                SHA1

                4755c7d9fb0582f94b8feb44be9d3c70031a0f33

                SHA256

                295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

                SHA512

                11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

              • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

                Filesize

                534KB

                MD5

                3702c2b44a1d4877f4d1187be6c33958

                SHA1

                4755c7d9fb0582f94b8feb44be9d3c70031a0f33

                SHA256

                295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

                SHA512

                11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

              • memory/384-130-0x0000000000940000-0x0000000000A5E000-memory.dmp

                Filesize

                1.1MB

              • memory/384-133-0x00000000055C0000-0x00000000055CA000-memory.dmp

                Filesize

                40KB

              • memory/384-131-0x0000000005A70000-0x0000000006014000-memory.dmp

                Filesize

                5.6MB

              • memory/384-132-0x0000000005400000-0x0000000005492000-memory.dmp

                Filesize

                584KB

              • memory/512-177-0x0000000000000000-mapping.dmp

              • memory/516-171-0x0000000000000000-mapping.dmp

              • memory/1680-143-0x0000000000400000-0x0000000000554000-memory.dmp

                Filesize

                1.3MB

              • memory/1680-140-0x0000000000400000-0x0000000000554000-memory.dmp

                Filesize

                1.3MB

              • memory/1680-139-0x0000000000000000-mapping.dmp

              • memory/2192-173-0x0000000000000000-mapping.dmp

              • memory/3340-134-0x0000000000000000-mapping.dmp

              • memory/3392-150-0x0000000000000000-mapping.dmp

              • memory/3684-176-0x0000000000000000-mapping.dmp

              • memory/4232-149-0x0000000000000000-mapping.dmp

              • memory/4352-159-0x0000000000000000-mapping.dmp

              • memory/4620-145-0x00000000009D0000-0x0000000000A5C000-memory.dmp

                Filesize

                560KB

              • memory/4620-148-0x0000000006730000-0x000000000676C000-memory.dmp

                Filesize

                240KB

              • memory/4620-147-0x00000000058A0000-0x00000000058B2000-memory.dmp

                Filesize

                72KB

              • memory/4620-146-0x0000000005310000-0x0000000005376000-memory.dmp

                Filesize

                408KB

              • memory/4620-142-0x0000000000000000-mapping.dmp

              • memory/4688-175-0x0000000000000000-mapping.dmp

              • memory/4732-138-0x0000000000000000-mapping.dmp

              • memory/4748-137-0x0000000000000000-mapping.dmp

              • memory/4808-155-0x0000000004E80000-0x00000000054A8000-memory.dmp

                Filesize

                6.2MB

              • memory/4808-162-0x00000000721A0000-0x00000000721EC000-memory.dmp

                Filesize

                304KB

              • memory/4808-164-0x00000000073A0000-0x0000000007A1A000-memory.dmp

                Filesize

                6.5MB

              • memory/4808-165-0x0000000006D40000-0x0000000006D5A000-memory.dmp

                Filesize

                104KB

              • memory/4808-166-0x0000000006000000-0x000000000600A000-memory.dmp

                Filesize

                40KB

              • memory/4808-167-0x0000000006FF0000-0x0000000007086000-memory.dmp

                Filesize

                600KB

              • memory/4808-168-0x0000000006F80000-0x0000000006F8E000-memory.dmp

                Filesize

                56KB

              • memory/4808-169-0x0000000006FD0000-0x0000000006FEA000-memory.dmp

                Filesize

                104KB

              • memory/4808-170-0x0000000006FC0000-0x0000000006FC8000-memory.dmp

                Filesize

                32KB

              • memory/4808-163-0x0000000006BF0000-0x0000000006C0E000-memory.dmp

                Filesize

                120KB

              • memory/4808-153-0x0000000000000000-mapping.dmp

              • memory/4808-161-0x0000000005EE0000-0x0000000005F12000-memory.dmp

                Filesize

                200KB

              • memory/4808-160-0x0000000004845000-0x0000000004847000-memory.dmp

                Filesize

                8KB

              • memory/4808-158-0x0000000005A30000-0x0000000005A4E000-memory.dmp

                Filesize

                120KB

              • memory/4808-157-0x0000000004D10000-0x0000000004D76000-memory.dmp

                Filesize

                408KB

              • memory/4808-156-0x0000000004A70000-0x0000000004A92000-memory.dmp

                Filesize

                136KB

              • memory/4808-154-0x0000000000C80000-0x0000000000CB6000-memory.dmp

                Filesize

                216KB

              • memory/5060-172-0x0000000000000000-mapping.dmp