Analysis
-
max time kernel
140s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-04-2022 05:30
Static task
static1
Behavioral task
behavioral1
Sample
bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe
Resource
win10v2004-20220414-en
General
-
Target
bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe
-
Size
1.1MB
-
MD5
a7bb91d79310d34d7c94e897257b3b5f
-
SHA1
156ef770d35ffc4da767fe156a91af27ec2808bd
-
SHA256
bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d
-
SHA512
9a067c7d1382b6ab9869345d4f6d524f8ab3c0d862162ad5e48184a35b5dc8ebd9674dd8b81667b78b3e43895e9d97509d63d1642be15d35b390567a47f10284
Malware Config
Extracted
quasar
2.1.0.0
Wraith00hrs
100.26.221.183:4782
VNM_MUTEX_kv7tSTHxhbSWaYVuIh
-
encryption_key
VyRhk9JpIqX4HHIRBxn8
-
install_name
windows chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
chrome Startup
-
subdirectory
SubDir
Extracted
warzonerat
100.26.221.183:5200
Signatures
-
Contains code to disable Windows Defender 6 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/files/0x00060000000231db-133.dat disable_win_def behavioral2/files/0x00060000000231db-135.dat disable_win_def behavioral2/memory/4680-137-0x0000000000E20000-0x0000000000EAC000-memory.dmp disable_win_def behavioral2/files/0x00060000000231e3-149.dat disable_win_def behavioral2/files/0x00060000000231e3-150.dat disable_win_def behavioral2/files/0x00060000000231db-177.dat disable_win_def -
Quasar Payload 6 IoCs
Processes:
resource yara_rule behavioral2/files/0x00060000000231db-133.dat family_quasar behavioral2/files/0x00060000000231db-135.dat family_quasar behavioral2/memory/4680-137-0x0000000000E20000-0x0000000000EAC000-memory.dmp family_quasar behavioral2/files/0x00060000000231e3-149.dat family_quasar behavioral2/files/0x00060000000231e3-150.dat family_quasar behavioral2/files/0x00060000000231db-177.dat family_quasar -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3856-138-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3856-141-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3856-143-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 3 IoCs
Processes:
$77-Venom.exewindows chrome.exe$77-Venom.exepid Process 4680 $77-Venom.exe 2372 windows chrome.exe 4080 $77-Venom.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exeWScript.exe$77-Venom.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation $77-Venom.exe -
Processes:
$77-Venom.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features $77-Venom.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" $77-Venom.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exebf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vlc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\VideoLAN\\vlc.exe\"" bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe" bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exedescription pid Process procid_target PID 5076 set thread context of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 4800 schtasks.exe 4556 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exe$77-Venom.exe$77-Venom.exepid Process 4836 powershell.exe 4836 powershell.exe 4680 $77-Venom.exe 4680 $77-Venom.exe 4680 $77-Venom.exe 4680 $77-Venom.exe 4680 $77-Venom.exe 4680 $77-Venom.exe 4680 $77-Venom.exe 4080 $77-Venom.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe$77-Venom.exepowershell.exewindows chrome.exe$77-Venom.exedescription pid Process Token: SeDebugPrivilege 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe Token: SeDebugPrivilege 4680 $77-Venom.exe Token: SeDebugPrivilege 4836 powershell.exe Token: SeDebugPrivilege 2372 windows chrome.exe Token: SeDebugPrivilege 2372 windows chrome.exe Token: SeDebugPrivilege 4080 $77-Venom.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
windows chrome.exepid Process 2372 windows chrome.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exeWScript.exe$77-Venom.exewindows chrome.execmd.execmd.exedescription pid Process procid_target PID 5076 wrote to memory of 4888 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 79 PID 5076 wrote to memory of 4888 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 79 PID 5076 wrote to memory of 4888 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 79 PID 4888 wrote to memory of 4680 4888 WScript.exe 80 PID 4888 wrote to memory of 4680 4888 WScript.exe 80 PID 4888 wrote to memory of 4680 4888 WScript.exe 80 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 5076 wrote to memory of 3856 5076 bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe 81 PID 4680 wrote to memory of 4800 4680 $77-Venom.exe 82 PID 4680 wrote to memory of 4800 4680 $77-Venom.exe 82 PID 4680 wrote to memory of 4800 4680 $77-Venom.exe 82 PID 4680 wrote to memory of 2372 4680 $77-Venom.exe 84 PID 4680 wrote to memory of 2372 4680 $77-Venom.exe 84 PID 4680 wrote to memory of 2372 4680 $77-Venom.exe 84 PID 4680 wrote to memory of 4836 4680 $77-Venom.exe 85 PID 4680 wrote to memory of 4836 4680 $77-Venom.exe 85 PID 4680 wrote to memory of 4836 4680 $77-Venom.exe 85 PID 2372 wrote to memory of 4556 2372 windows chrome.exe 87 PID 2372 wrote to memory of 4556 2372 windows chrome.exe 87 PID 2372 wrote to memory of 4556 2372 windows chrome.exe 87 PID 4680 wrote to memory of 456 4680 $77-Venom.exe 89 PID 4680 wrote to memory of 456 4680 $77-Venom.exe 89 PID 4680 wrote to memory of 456 4680 $77-Venom.exe 89 PID 456 wrote to memory of 4236 456 cmd.exe 91 PID 456 wrote to memory of 4236 456 cmd.exe 91 PID 456 wrote to memory of 4236 456 cmd.exe 91 PID 4680 wrote to memory of 4468 4680 $77-Venom.exe 93 PID 4680 wrote to memory of 4468 4680 $77-Venom.exe 93 PID 4680 wrote to memory of 4468 4680 $77-Venom.exe 93 PID 4468 wrote to memory of 204 4468 cmd.exe 95 PID 4468 wrote to memory of 204 4468 cmd.exe 95 PID 4468 wrote to memory of 204 4468 cmd.exe 95 PID 4468 wrote to memory of 4808 4468 cmd.exe 96 PID 4468 wrote to memory of 4808 4468 cmd.exe 96 PID 4468 wrote to memory of 4808 4468 cmd.exe 96 PID 4468 wrote to memory of 4080 4468 cmd.exe 97 PID 4468 wrote to memory of 4080 4468 cmd.exe 97 PID 4468 wrote to memory of 4080 4468 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe"C:\Users\Admin\AppData\Local\Temp\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Cnlfayagwcnd.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:4800
-
-
C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "chrome Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows chrome.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:4556
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit4⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*5⤵PID:4236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uKVrhYM8ZK4R.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:204
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"C:\Users\Admin\AppData\Local\Temp\$77-Venom.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe"C:\Users\Admin\AppData\Local\Temp\bf9d1ce445841e9cc60347ec69a86ce1131695e93c50235022ed5964d428c15d.exe"2⤵
- Adds Run key to start application
PID:3856
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
97B
MD521cf56d4b0a76046820523108fb676e0
SHA19535221712c50c9a3fa7e06efe5e1efc016f715d
SHA2562f931374cab0f3601d1698f4943f8e4f83cbfc3efb478bf518091ab23642dbc3
SHA5125c2238aece0a82b63a541142dcee3527e3d1baad206d3fb7c3d226fd99c26c1c2d5d4113584be08118316fd5d78c3f7aca2f3d0e957c87f76b92615a24601cd5
-
Filesize
206B
MD56361466db9be91070c236f11a6a88c97
SHA1c0ebcb52beda93f5168533c53a58be7046b84cf6
SHA256d6b43ff6389a693131be6d37f77aa70a665070140c06d1431bdf36fc3622e46f
SHA5127bbd2ab619cdae0dbfb4fa147833eb359826c31babec4f748d9f4091b6fb823583efffdc8646a04d3449d99bf1fcf20093d671c11b204db4cbb45936279eb465
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86
-
Filesize
534KB
MD54ad1c7279f350bad69cec245674fbdbd
SHA1af9cb6ea681d09f9c535d5bd55a9adcf5c9bc7f2
SHA2569505524dff86345befdf3ce0dba5a7a58abe57725badbe0aa19a16ac20579422
SHA512740190c6aceab1a81c37455cf86ae87908f77feb1dcff042c90ade2baeae730fdd0ade9f3921b56df6f55e726e2fb284909c62a0862147f6e679b7aa51f79d86