Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-04-2022 00:47

General

  • Target

    afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe

  • Size

    1.3MB

  • MD5

    911fba11f3c34d2e3d58b3a1686886ed

  • SHA1

    579dd4231fc1dbbe109f3beb08a793ed02eff09e

  • SHA256

    afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7

  • SHA512

    49f99c8cf0812db0b88f691d532ddea4f2bc8ef9b4b6e99842f402bb370e53684e86dd3bd2b506785c13dcbb0745ff40c8129249989aaca7177a736b43076f9c

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Wraith00hrs

C2

100.26.221.183:4782

Mutex

VNM_MUTEX_kv7tSTHxhbSWaYVuIh

Attributes
  • encryption_key

    VyRhk9JpIqX4HHIRBxn8

  • install_name

    windows chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    chrome Startup

  • subdirectory

    SubDir

Extracted

Family

warzonerat

C2

100.26.221.183:5200

Signatures

  • Contains code to disable Windows Defender 6 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 6 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe
    "C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Jjlxrtnulqhzcd.vbs"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
        "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:2592
        • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5084
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:1732
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4276
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3188
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
            5⤵
              PID:972
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\e3ncpmSglZGY.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2224
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              5⤵
                PID:4760
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 10 localhost
                5⤵
                • Runs ping.exe
                PID:216
              • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
                "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:32
        • C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe
          "C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe"
          2⤵
            PID:2200
          • C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe
            "C:\Users\Admin\AppData\Local\Temp\afe6ffe01133465cb36e3822a6a0583dc2041f405d82fe231d0ecc95ec05c7c7.exe"
            2⤵
            • Adds Run key to start application
            PID:2812

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\$77-Venom.exe.log

          Filesize

          1KB

          MD5

          10eab9c2684febb5327b6976f2047587

          SHA1

          a12ed54146a7f5c4c580416aecb899549712449e

          SHA256

          f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

          SHA512

          7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

        • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • C:\Users\Admin\AppData\Local\Temp\Jjlxrtnulqhzcd.vbs

          Filesize

          97B

          MD5

          21cf56d4b0a76046820523108fb676e0

          SHA1

          9535221712c50c9a3fa7e06efe5e1efc016f715d

          SHA256

          2f931374cab0f3601d1698f4943f8e4f83cbfc3efb478bf518091ab23642dbc3

          SHA512

          5c2238aece0a82b63a541142dcee3527e3d1baad206d3fb7c3d226fd99c26c1c2d5d4113584be08118316fd5d78c3f7aca2f3d0e957c87f76b92615a24601cd5

        • C:\Users\Admin\AppData\Local\Temp\e3ncpmSglZGY.bat

          Filesize

          206B

          MD5

          43d7673436c73c2f844f42371f5c6da3

          SHA1

          efd1201901b405ba36beac60fe78ae2435625206

          SHA256

          0c97f22f8e1919127d7bca5296d4a9fc0e7448a64c3b632a3def0599a6d66943

          SHA512

          00cc229851549cbcf1bdc6fdb7dcdc89bc9d3c1b69142c060a1b6e904c1df076ebccc62adde56a203c976d004d2392c2fe8b8c0260dd5f2cf3c52b4a60695301

        • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • memory/32-177-0x0000000000000000-mapping.dmp

        • memory/216-176-0x0000000000000000-mapping.dmp

        • memory/972-172-0x0000000000000000-mapping.dmp

        • memory/1732-159-0x0000000000000000-mapping.dmp

        • memory/2060-130-0x0000000000FF0000-0x0000000001148000-memory.dmp

          Filesize

          1.3MB

        • memory/2060-133-0x0000000005AF0000-0x0000000005AFA000-memory.dmp

          Filesize

          40KB

        • memory/2060-132-0x0000000005B60000-0x0000000005BF2000-memory.dmp

          Filesize

          584KB

        • memory/2060-131-0x0000000006110000-0x00000000066B4000-memory.dmp

          Filesize

          5.6MB

        • memory/2196-137-0x0000000000000000-mapping.dmp

        • memory/2196-140-0x0000000000820000-0x00000000008AC000-memory.dmp

          Filesize

          560KB

        • memory/2196-148-0x00000000064B0000-0x00000000064EC000-memory.dmp

          Filesize

          240KB

        • memory/2196-147-0x0000000006090000-0x00000000060A2000-memory.dmp

          Filesize

          72KB

        • memory/2196-146-0x0000000005130000-0x0000000005196000-memory.dmp

          Filesize

          408KB

        • memory/2200-139-0x0000000000000000-mapping.dmp

        • memory/2224-173-0x0000000000000000-mapping.dmp

        • memory/2248-134-0x0000000000000000-mapping.dmp

        • memory/2592-149-0x0000000000000000-mapping.dmp

        • memory/2812-144-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/2812-142-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/2812-141-0x0000000000000000-mapping.dmp

        • memory/2812-145-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/3188-171-0x0000000000000000-mapping.dmp

        • memory/4276-155-0x0000000005440000-0x0000000005A68000-memory.dmp

          Filesize

          6.2MB

        • memory/4276-170-0x0000000007850000-0x0000000007858000-memory.dmp

          Filesize

          32KB

        • memory/4276-163-0x00000000067D0000-0x00000000067EE000-memory.dmp

          Filesize

          120KB

        • memory/4276-164-0x0000000007B70000-0x00000000081EA000-memory.dmp

          Filesize

          6.5MB

        • memory/4276-165-0x0000000007530000-0x000000000754A000-memory.dmp

          Filesize

          104KB

        • memory/4276-166-0x00000000075A0000-0x00000000075AA000-memory.dmp

          Filesize

          40KB

        • memory/4276-167-0x00000000077B0000-0x0000000007846000-memory.dmp

          Filesize

          600KB

        • memory/4276-168-0x0000000007760000-0x000000000776E000-memory.dmp

          Filesize

          56KB

        • memory/4276-169-0x0000000007870000-0x000000000788A000-memory.dmp

          Filesize

          104KB

        • memory/4276-162-0x0000000070380000-0x00000000703CC000-memory.dmp

          Filesize

          304KB

        • memory/4276-161-0x00000000067F0000-0x0000000006822000-memory.dmp

          Filesize

          200KB

        • memory/4276-160-0x00000000028A0000-0x00000000028B0000-memory.dmp

          Filesize

          64KB

        • memory/4276-158-0x0000000005E40000-0x0000000005E5E000-memory.dmp

          Filesize

          120KB

        • memory/4276-157-0x0000000005B70000-0x0000000005BD6000-memory.dmp

          Filesize

          408KB

        • memory/4276-152-0x0000000000000000-mapping.dmp

        • memory/4276-156-0x0000000005370000-0x0000000005392000-memory.dmp

          Filesize

          136KB

        • memory/4276-154-0x0000000002900000-0x0000000002936000-memory.dmp

          Filesize

          216KB

        • memory/4760-175-0x0000000000000000-mapping.dmp

        • memory/5084-150-0x0000000000000000-mapping.dmp