Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-04-2022 00:47
Static task
static1
Behavioral task
behavioral1
Sample
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe
Resource
win10v2004-20220414-en
General
-
Target
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe
-
Size
1.3MB
-
MD5
911fba11f3c34d2e3d58b3a1686886ed
-
SHA1
579dd4231fc1dbbe109f3beb08a793ed02eff09e
-
SHA256
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7
-
SHA512
49f99c8cf0812db0b88f691d532ddea4f2bc8ef9b4b6e99842f402bb370e53684e86dd3bd2b506785c13dcbb0745ff40c8129249989aaca7177a736b43076f9c
Malware Config
Extracted
quasar
2.1.0.0
Wraith00hrs
100.26.221.183:4782
VNM_MUTEX_kv7tSTHxhbSWaYVuIh
-
encryption_key
VyRhk9JpIqX4HHIRBxn8
-
install_name
windows chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
chrome Startup
-
subdirectory
SubDir
Extracted
warzonerat
100.26.221.183:5200
Signatures
-
Contains code to disable Windows Defender 6 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/files/0x0007000000023154-136.dat disable_win_def behavioral2/files/0x0007000000023154-138.dat disable_win_def behavioral2/memory/2196-140-0x0000000000820000-0x00000000008AC000-memory.dmp disable_win_def behavioral2/files/0x000600000002315c-151.dat disable_win_def behavioral2/files/0x000600000002315c-153.dat disable_win_def behavioral2/files/0x0007000000023154-178.dat disable_win_def -
Quasar Payload 6 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000023154-136.dat family_quasar behavioral2/files/0x0007000000023154-138.dat family_quasar behavioral2/memory/2196-140-0x0000000000820000-0x00000000008AC000-memory.dmp family_quasar behavioral2/files/0x000600000002315c-151.dat family_quasar behavioral2/files/0x000600000002315c-153.dat family_quasar behavioral2/files/0x0007000000023154-178.dat family_quasar -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2812-142-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/2812-144-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/2812-145-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 3 IoCs
Processes:
$77-Venom.exewindows chrome.exe$77-Venom.exepid Process 2196 $77-Venom.exe 5084 windows chrome.exe 32 $77-Venom.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exeWScript.exe$77-Venom.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation $77-Venom.exe -
Processes:
$77-Venom.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features $77-Venom.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" $77-Venom.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exeafe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vlc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\VideoLAN\\vlc.exe\"" afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\Users\\Admin\\AppData\\Local\\Temp\\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe" afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exedescription pid Process procid_target PID 2060 set thread context of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 1732 schtasks.exe 2592 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exepowershell.exe$77-Venom.exe$77-Venom.exepid Process 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 4276 powershell.exe 4276 powershell.exe 2196 $77-Venom.exe 2196 $77-Venom.exe 2196 $77-Venom.exe 2196 $77-Venom.exe 2196 $77-Venom.exe 2196 $77-Venom.exe 2196 $77-Venom.exe 32 $77-Venom.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe$77-Venom.exepowershell.exewindows chrome.exe$77-Venom.exedescription pid Process Token: SeDebugPrivilege 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe Token: SeDebugPrivilege 2196 $77-Venom.exe Token: SeDebugPrivilege 4276 powershell.exe Token: SeDebugPrivilege 5084 windows chrome.exe Token: SeDebugPrivilege 5084 windows chrome.exe Token: SeDebugPrivilege 32 $77-Venom.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
windows chrome.exepid Process 5084 windows chrome.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exeWScript.exe$77-Venom.exewindows chrome.execmd.execmd.exedescription pid Process procid_target PID 2060 wrote to memory of 2248 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 76 PID 2060 wrote to memory of 2248 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 76 PID 2060 wrote to memory of 2248 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 76 PID 2248 wrote to memory of 2196 2248 WScript.exe 77 PID 2248 wrote to memory of 2196 2248 WScript.exe 77 PID 2248 wrote to memory of 2196 2248 WScript.exe 77 PID 2060 wrote to memory of 2200 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 78 PID 2060 wrote to memory of 2200 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 78 PID 2060 wrote to memory of 2200 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 78 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2060 wrote to memory of 2812 2060 afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe 79 PID 2196 wrote to memory of 2592 2196 $77-Venom.exe 80 PID 2196 wrote to memory of 2592 2196 $77-Venom.exe 80 PID 2196 wrote to memory of 2592 2196 $77-Venom.exe 80 PID 2196 wrote to memory of 5084 2196 $77-Venom.exe 82 PID 2196 wrote to memory of 5084 2196 $77-Venom.exe 82 PID 2196 wrote to memory of 5084 2196 $77-Venom.exe 82 PID 2196 wrote to memory of 4276 2196 $77-Venom.exe 83 PID 2196 wrote to memory of 4276 2196 $77-Venom.exe 83 PID 2196 wrote to memory of 4276 2196 $77-Venom.exe 83 PID 5084 wrote to memory of 1732 5084 windows chrome.exe 85 PID 5084 wrote to memory of 1732 5084 windows chrome.exe 85 PID 5084 wrote to memory of 1732 5084 windows chrome.exe 85 PID 2196 wrote to memory of 3188 2196 $77-Venom.exe 87 PID 2196 wrote to memory of 3188 2196 $77-Venom.exe 87 PID 2196 wrote to memory of 3188 2196 $77-Venom.exe 87 PID 3188 wrote to memory of 972 3188 cmd.exe 89 PID 3188 wrote to memory of 972 3188 cmd.exe 89 PID 3188 wrote to memory of 972 3188 cmd.exe 89 PID 2196 wrote to memory of 2224 2196 $77-Venom.exe 90 PID 2196 wrote to memory of 2224 2196 $77-Venom.exe 90 PID 2196 wrote to memory of 2224 2196 $77-Venom.exe 90 PID 2224 wrote to memory of 4760 2224 cmd.exe 92 PID 2224 wrote to memory of 4760 2224 cmd.exe 92 PID 2224 wrote to memory of 4760 2224 cmd.exe 92 PID 2224 wrote to memory of 216 2224 cmd.exe 93 PID 2224 wrote to memory of 216 2224 cmd.exe 93 PID 2224 wrote to memory of 216 2224 cmd.exe 93 PID 2224 wrote to memory of 32 2224 cmd.exe 94 PID 2224 wrote to memory of 32 2224 cmd.exe 94 PID 2224 wrote to memory of 32 2224 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe"C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Jjlxrtnulqhzcd.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:2592
-
-
C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:1732
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit4⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*5⤵PID:972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\e3ncpmSglZGY.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:4760
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe"C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe"2⤵PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe"C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe"2⤵
- Adds Run key to start application
PID:2812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
97B
MD521cf56d4b0a76046820523108fb676e0
SHA19535221712c50c9a3fa7e06efe5e1efc016f715d
SHA2562f931374cab0f3601d1698f4943f8e4f83cbfc3efb478bf518091ab23642dbc3
SHA5125c2238aece0a82b63a541142dcee3527e3d1baad206d3fb7c3d226fd99c26c1c2d5d4113584be08118316fd5d78c3f7aca2f3d0e957c87f76b92615a24601cd5
-
Filesize
206B
MD543d7673436c73c2f844f42371f5c6da3
SHA1efd1201901b405ba36beac60fe78ae2435625206
SHA2560c97f22f8e1919127d7bca5296d4a9fc0e7448a64c3b632a3def0599a6d66943
SHA51200cc229851549cbcf1bdc6fdb7dcdc89bc9d3c1b69142c060a1b6e904c1df076ebccc62adde56a203c976d004d2392c2fe8b8c0260dd5f2cf3c52b4a60695301
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86