Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-04-2022 05:30

General

  • Target

    bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe

  • Size

    1.1MB

  • MD5

    a7bb91d79310d34d7c94e897257b3b5f

  • SHA1

    156ef770d35ffc4da767fe156a91af27ec2808bd

  • SHA256

    bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d

  • SHA512

    9a067c7d1382b6ab9869345d4f6d524f8ab3c0d862162ad5e48184a35b5dc8ebd9674dd8b81667b78b3e43895e9d97509d63d1642be15d35b390567a47f10284

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Wraith00hrs

C2

100.26.221.183:4782

Mutex

VNM_MUTEX_kv7tSTHxhbSWaYVuIh

Attributes
  • encryption_key

    VyRhk9JpIqX4HHIRBxn8

  • install_name

    windows chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    chrome Startup

  • subdirectory

    SubDir

Extracted

Family

warzonerat

C2

100.26.221.183:5200

Signatures

  • Contains code to disable Windows Defender 11 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 11 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 8 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe
    "C:\Users\Admin\AppData\Local\Temp\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Cnlfayagwcnd.vbs"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
        "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Adds Run key to start application
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:1940
        • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1076
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:780
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1816
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
            5⤵
              PID:1772
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\5FeRNShmk94M.bat" "
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:912
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              5⤵
                PID:1688
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 10 localhost
                5⤵
                • Runs ping.exe
                PID:428
              • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe
                "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:964
        • C:\Users\Admin\AppData\Local\Temp\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe
          "C:\Users\Admin\AppData\Local\Temp\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe"
          2⤵
            PID:592
          • C:\Users\Admin\AppData\Local\Temp\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe
            "C:\Users\Admin\AppData\Local\Temp\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe"
            2⤵
            • Adds Run key to start application
            PID:1316

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • C:\Users\Admin\AppData\Local\Temp\5FeRNShmk94M.bat

          Filesize

          206B

          MD5

          c3e238ff4f9787e9e7bfa1015d9a4a25

          SHA1

          bd629eece979a068f5fbd09ae2d0173ca26a2d37

          SHA256

          c0051a29642801f7208f7aa6726e6c6c0f1ba547342377d7e20a3892718acee5

          SHA512

          3523227d109995e19dffe41c0326b57eae5b368dfc1ac380de213eddfe214d9705c798b9fa68a05f2e0a3b1921005a0f69e8dd96082dbebbaad69c0efedf19b3

        • C:\Users\Admin\AppData\Local\Temp\Cnlfayagwcnd.vbs

          Filesize

          97B

          MD5

          21cf56d4b0a76046820523108fb676e0

          SHA1

          9535221712c50c9a3fa7e06efe5e1efc016f715d

          SHA256

          2f931374cab0f3601d1698f4943f8e4f83cbfc3efb478bf518091ab23642dbc3

          SHA512

          5c2238aece0a82b63a541142dcee3527e3d1baad206d3fb7c3d226fd99c26c1c2d5d4113584be08118316fd5d78c3f7aca2f3d0e957c87f76b92615a24601cd5

        • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • \Users\Admin\AppData\Local\Temp\$77-Venom.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • \Users\Admin\AppData\Local\Temp\$77-Venom.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • \Users\Admin\AppData\Roaming\SubDir\windows chrome.exe

          Filesize

          534KB

          MD5

          4ad1c7279f350bad69cec245674fbdbd

          SHA1

          af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2

          SHA256

          9505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422

          SHA512

          740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86

        • memory/428-97-0x0000000000000000-mapping.dmp

        • memory/780-89-0x0000000000000000-mapping.dmp

        • memory/868-54-0x00000000012A0000-0x00000000013C6000-memory.dmp

          Filesize

          1.1MB

        • memory/868-63-0x0000000000C20000-0x0000000000C3C000-memory.dmp

          Filesize

          112KB

        • memory/868-55-0x0000000000C80000-0x0000000000D14000-memory.dmp

          Filesize

          592KB

        • memory/912-94-0x0000000000000000-mapping.dmp

        • memory/964-99-0x0000000000000000-mapping.dmp

        • memory/964-101-0x0000000000C40000-0x0000000000CCC000-memory.dmp

          Filesize

          560KB

        • memory/1076-86-0x0000000000910000-0x000000000099C000-memory.dmp

          Filesize

          560KB

        • memory/1076-83-0x0000000000000000-mapping.dmp

        • memory/1316-70-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1316-80-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1316-79-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1316-76-0x0000000000405CE2-mapping.dmp

        • memory/1316-75-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1316-74-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1316-73-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1316-71-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1316-68-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1316-66-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1316-65-0x0000000000400000-0x0000000000554000-memory.dmp

          Filesize

          1.3MB

        • memory/1616-64-0x0000000000BF0000-0x0000000000C7C000-memory.dmp

          Filesize

          560KB

        • memory/1616-61-0x0000000000000000-mapping.dmp

        • memory/1688-96-0x0000000000000000-mapping.dmp

        • memory/1692-92-0x0000000000000000-mapping.dmp

        • memory/1704-58-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

          Filesize

          8KB

        • memory/1704-56-0x0000000000000000-mapping.dmp

        • memory/1772-93-0x0000000000000000-mapping.dmp

        • memory/1816-91-0x0000000002522000-0x0000000002524000-memory.dmp

          Filesize

          8KB

        • memory/1816-90-0x000000006F250000-0x000000006F7FB000-memory.dmp

          Filesize

          5.7MB

        • memory/1816-87-0x0000000000000000-mapping.dmp

        • memory/1940-81-0x0000000000000000-mapping.dmp