Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-04-2022 04:09
Static task
static1
Behavioral task
behavioral1
Sample
150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe
Resource
win10v2004-20220414-en
General
-
Target
150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe
-
Size
1.2MB
-
MD5
a56950b911b53a07e64b1a2f87c2907c
-
SHA1
2d61afb037ac5ce044b5258b581b28badffae235
-
SHA256
150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8
-
SHA512
16a3417b212243bb8bb9814636f364971292a75cf2901d936141ddb7afa7ad63da52bcbfa429de7f867ac05fa71d7c7c34459d3e86243cecfeee46f34ccf0bcc
Malware Config
Extracted
warzonerat
100.26.221.183:5200
Extracted
quasar
2.1.0.0
Wraith00hrs
100.26.221.183:4782
VNM_MUTEX_kv7tSTHxhbSWaYVuIh
-
encryption_key
VyRhk9JpIqX4HHIRBxn8
-
install_name
windows chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
chrome Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 6 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/files/0x0007000000022ed0-135.dat disable_win_def behavioral2/files/0x0007000000022ed0-139.dat disable_win_def behavioral2/memory/4536-140-0x0000000000BA0000-0x0000000000C2C000-memory.dmp disable_win_def behavioral2/files/0x0006000000022eda-149.dat disable_win_def behavioral2/files/0x0006000000022eda-150.dat disable_win_def behavioral2/files/0x0007000000022ed0-176.dat disable_win_def -
Quasar Payload 6 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000022ed0-135.dat family_quasar behavioral2/files/0x0007000000022ed0-139.dat family_quasar behavioral2/memory/4536-140-0x0000000000BA0000-0x0000000000C2C000-memory.dmp family_quasar behavioral2/files/0x0006000000022eda-149.dat family_quasar behavioral2/files/0x0006000000022eda-150.dat family_quasar behavioral2/files/0x0007000000022ed0-176.dat family_quasar -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5044-134-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/5044-138-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/5044-142-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 3 IoCs
Processes:
CreativeCloudv.exewindows chrome.exeCreativeCloudv.exepid Process 4536 CreativeCloudv.exe 4416 windows chrome.exe 3496 CreativeCloudv.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exeWScript.exeCreativeCloudv.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation CreativeCloudv.exe -
Processes:
CreativeCloudv.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features CreativeCloudv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" CreativeCloudv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\Users\\Admin\\AppData\\Local\\Temp\\150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe" 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exedescription pid Process procid_target PID 4760 set thread context of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 4808 schtasks.exe 1616 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000_Classes\Local Settings 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exeCreativeCloudv.exeCreativeCloudv.exepid Process 4396 powershell.exe 4396 powershell.exe 4536 CreativeCloudv.exe 4536 CreativeCloudv.exe 4536 CreativeCloudv.exe 4536 CreativeCloudv.exe 4536 CreativeCloudv.exe 4536 CreativeCloudv.exe 4536 CreativeCloudv.exe 3496 CreativeCloudv.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exeCreativeCloudv.exepowershell.exewindows chrome.exeCreativeCloudv.exedescription pid Process Token: SeDebugPrivilege 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe Token: SeDebugPrivilege 4536 CreativeCloudv.exe Token: SeDebugPrivilege 4396 powershell.exe Token: SeDebugPrivilege 4416 windows chrome.exe Token: SeDebugPrivilege 4416 windows chrome.exe Token: SeDebugPrivilege 3496 CreativeCloudv.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
windows chrome.exepid Process 4416 windows chrome.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exeWScript.exeCreativeCloudv.exewindows chrome.execmd.execmd.exedescription pid Process procid_target PID 4760 wrote to memory of 1692 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 82 PID 4760 wrote to memory of 1692 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 82 PID 4760 wrote to memory of 1692 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 82 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 4760 wrote to memory of 5044 4760 150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe 83 PID 1692 wrote to memory of 4536 1692 WScript.exe 84 PID 1692 wrote to memory of 4536 1692 WScript.exe 84 PID 1692 wrote to memory of 4536 1692 WScript.exe 84 PID 4536 wrote to memory of 1616 4536 CreativeCloudv.exe 85 PID 4536 wrote to memory of 1616 4536 CreativeCloudv.exe 85 PID 4536 wrote to memory of 1616 4536 CreativeCloudv.exe 85 PID 4536 wrote to memory of 4416 4536 CreativeCloudv.exe 87 PID 4536 wrote to memory of 4416 4536 CreativeCloudv.exe 87 PID 4536 wrote to memory of 4416 4536 CreativeCloudv.exe 87 PID 4536 wrote to memory of 4396 4536 CreativeCloudv.exe 88 PID 4536 wrote to memory of 4396 4536 CreativeCloudv.exe 88 PID 4536 wrote to memory of 4396 4536 CreativeCloudv.exe 88 PID 4416 wrote to memory of 4808 4416 windows chrome.exe 90 PID 4416 wrote to memory of 4808 4416 windows chrome.exe 90 PID 4416 wrote to memory of 4808 4416 windows chrome.exe 90 PID 4536 wrote to memory of 3956 4536 CreativeCloudv.exe 92 PID 4536 wrote to memory of 3956 4536 CreativeCloudv.exe 92 PID 4536 wrote to memory of 3956 4536 CreativeCloudv.exe 92 PID 3956 wrote to memory of 2208 3956 cmd.exe 94 PID 3956 wrote to memory of 2208 3956 cmd.exe 94 PID 3956 wrote to memory of 2208 3956 cmd.exe 94 PID 4536 wrote to memory of 2440 4536 CreativeCloudv.exe 98 PID 4536 wrote to memory of 2440 4536 CreativeCloudv.exe 98 PID 4536 wrote to memory of 2440 4536 CreativeCloudv.exe 98 PID 2440 wrote to memory of 1840 2440 cmd.exe 100 PID 2440 wrote to memory of 1840 2440 cmd.exe 100 PID 2440 wrote to memory of 1840 2440 cmd.exe 100 PID 2440 wrote to memory of 4084 2440 cmd.exe 101 PID 2440 wrote to memory of 4084 2440 cmd.exe 101 PID 2440 wrote to memory of 4084 2440 cmd.exe 101 PID 2440 wrote to memory of 3496 2440 cmd.exe 102 PID 2440 wrote to memory of 3496 2440 cmd.exe 102 PID 2440 wrote to memory of 3496 2440 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe"C:\Users\Admin\AppData\Local\Temp\150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Ucjyesajhla.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\CreativeCloudv.exe"C:\Users\Admin\AppData\Local\Temp\CreativeCloudv.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\CreativeCloudv.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1616
-
-
C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:4808
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit4⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*5⤵PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JaabZwTzf5PP.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:1840
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\CreativeCloudv.exe"C:\Users\Admin\AppData\Local\Temp\CreativeCloudv.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe"C:\Users\Admin\AppData\Local\Temp\150ba1e4f4c8340037db7b118b3f95280e231656bdf1f575aa5a2d73591267c8.exe"2⤵
- Adds Run key to start application
PID:5044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
211B
MD51217506aad2f753c7cac627866546e80
SHA1976d60c056c216abbe8a2bf6cad628be17a3d66e
SHA2567eb02bc66bc22313bf3cff222f037452c713b655db92643bf728144d16c1a8da
SHA512b01be6cbd36fe151080a56d2013cbf70f41ec533afe66fd81e6967820068f782bb010a6b8bb26878f4d9d0de167130d0f154fae4c4ef47b526d626d96c93635f
-
Filesize
102B
MD54e190d8967b1a3444f9415b850f7f1de
SHA1ba0336117fd8f29d19befb740d702cb32b9458ec
SHA2565968a1b0a70ee3af256dbbc94ea040822985a965b68fa5964037b25231a1151d
SHA5125afbd7492274ec2abb6d6fae4bd5f97f684fe1f27e11f73e4548b16a93f50fddb889a0747e2171345ededa8674ee8c50508cb7db188ca30a468c590075f528e8
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86