Analysis

  • max time kernel
    4294216s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    14-04-2022 13:35

General

  • Target

    34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e.exe

  • Size

    1.2MB

  • MD5

    a7850e7c98d51d8143fac5ea73a8b7c1

  • SHA1

    d983449e7e47fd7abd80ebcd7e00941bcfe59c50

  • SHA256

    34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e

  • SHA512

    a8c91d8f41e57cb3e6e5247a17a4e9e103d64f7b53a4e2b8da7e9d1ee7c4578f9c191fd25a9f422d175034e59492535ee8d19045a1ac2ec836959527d23c48b9

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

shooter00hrs

C2

185.219.134.245:4782

Mutex

VNM_MUTEX_ZFDh9LaTbTmwqFwo3L

Attributes
  • encryption_key

    wGYjrQIx5abERLvzC8Zu

  • install_name

    windows chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    chrome Startup

  • subdirectory

    SubDir

Extracted

Family

warzonerat

C2

185.219.134.245:5200

Signatures

  • Contains code to disable Windows Defender 8 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 8 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 9 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e.exe
    "C:\Users\Admin\AppData\Local\Temp\34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Pxjdcddn.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
        "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:1544
        • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1236
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:1228
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:620
    • C:\Users\Admin\AppData\Local\Temp\34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e.exe
      "C:\Users\Admin\AppData\Local\Temp\34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e.exe"
      2⤵
      • Adds Run key to start application
      PID:1468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

    Filesize

    534KB

    MD5

    3702c2b44a1d4877f4d1187be6c33958

    SHA1

    4755c7d9fb0582f94b8feb44be9d3c70031a0f33

    SHA256

    295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

    SHA512

    11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

  • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

    Filesize

    534KB

    MD5

    3702c2b44a1d4877f4d1187be6c33958

    SHA1

    4755c7d9fb0582f94b8feb44be9d3c70031a0f33

    SHA256

    295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

    SHA512

    11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

  • C:\Users\Admin\AppData\Local\Temp\Pxjdcddn.vbs

    Filesize

    97B

    MD5

    21cf56d4b0a76046820523108fb676e0

    SHA1

    9535221712c50c9a3fa7e06efe5e1efc016f715d

    SHA256

    2f931374cab0f3601d1698f4943f8e4f83cbfc3efb478bf518091ab23642dbc3

    SHA512

    5c2238aece0a82b63a541142dcee3527e3d1baad206d3fb7c3d226fd99c26c1c2d5d4113584be08118316fd5d78c3f7aca2f3d0e957c87f76b92615a24601cd5

  • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

    Filesize

    534KB

    MD5

    3702c2b44a1d4877f4d1187be6c33958

    SHA1

    4755c7d9fb0582f94b8feb44be9d3c70031a0f33

    SHA256

    295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

    SHA512

    11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

  • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

    Filesize

    534KB

    MD5

    3702c2b44a1d4877f4d1187be6c33958

    SHA1

    4755c7d9fb0582f94b8feb44be9d3c70031a0f33

    SHA256

    295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

    SHA512

    11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

  • \Users\Admin\AppData\Local\Temp\$77-Venom.exe

    Filesize

    534KB

    MD5

    3702c2b44a1d4877f4d1187be6c33958

    SHA1

    4755c7d9fb0582f94b8feb44be9d3c70031a0f33

    SHA256

    295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

    SHA512

    11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

  • \Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

    Filesize

    534KB

    MD5

    3702c2b44a1d4877f4d1187be6c33958

    SHA1

    4755c7d9fb0582f94b8feb44be9d3c70031a0f33

    SHA256

    295277e76cfe8b80f6a2a9db2c69fdd2b36b4866b35fdec4cd7d6c67faecceb6

    SHA512

    11d073f0a6120a3fc874fed5162810c780f52adfb21f8c9cf2720991c7ea6236a0bb5be28b40f35819c21db354dda52b818479104d50be9bd89b3d901c209aca

  • memory/620-90-0x000000006F2D0000-0x000000006F87B000-memory.dmp

    Filesize

    5.7MB

  • memory/620-91-0x00000000022F0000-0x0000000002F3A000-memory.dmp

    Filesize

    12.3MB

  • memory/1032-59-0x0000000001F90000-0x0000000001FAC000-memory.dmp

    Filesize

    112KB

  • memory/1032-54-0x0000000000A40000-0x0000000000B6C000-memory.dmp

    Filesize

    1.2MB

  • memory/1032-55-0x0000000002160000-0x00000000021F4000-memory.dmp

    Filesize

    592KB

  • memory/1236-86-0x00000000008A0000-0x000000000092C000-memory.dmp

    Filesize

    560KB

  • memory/1468-73-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1468-71-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1468-75-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1468-79-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1468-80-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1468-65-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1468-74-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1468-70-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1468-68-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1468-66-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1880-58-0x0000000076AE1000-0x0000000076AE3000-memory.dmp

    Filesize

    8KB

  • memory/2032-64-0x0000000000AD0000-0x0000000000B5C000-memory.dmp

    Filesize

    560KB