Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11-05-2022 02:40

General

  • Target

    08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe

  • Size

    1.8MB

  • MD5

    31431004556597a633f858c122c85b60

  • SHA1

    fea5847bb6a5daae2688e349c827e30c51b4485f

  • SHA256

    08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712

  • SHA512

    7ea9edb6586a04f95de3522bd6a9aac661a04bfdd66af9c5d76fc38c5412deee8053db2e3906bfebbcae3d80141aee263bc73ac12de13f1f1f3df8f72241c8bd

Malware Config

Extracted

Family

warzonerat

C2

hive01.duckdns.org:8584

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • HiveRAT Payload 12 IoCs
  • Warzone RAT Payload 3 IoCs
  • Executes dropped EXE 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 7 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe
    "C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe
      "C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe"
      2⤵
      • Executes dropped EXE
      PID:1168
    • C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe
      "C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe"
      2⤵
      • Executes dropped EXE
      PID:3540
    • C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe
      "C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe"
      2⤵
      • Executes dropped EXE
      PID:992
    • C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe
      "C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Users\Admin\AppData\Local\Temp\1.exe
        "C:\Users\Admin\AppData\Local\Temp\1.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3588
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          "C:\Users\Admin\AppData\Local\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          PID:4924
      • C:\Users\Admin\AppData\Local\Temp\2.exe
        "C:\Users\Admin\AppData\Local\Temp\2.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4368
        • C:\Users\Admin\AppData\Local\Temp\2.exe
          "C:\Users\Admin\AppData\Local\Temp\2.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:1712
      • C:\Users\Admin\AppData\Local\Temp\3.exe
        "C:\Users\Admin\AppData\Local\Temp\3.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4184
        • C:\Users\Admin\AppData\Local\Temp\3.exe
          "C:\Users\Admin\AppData\Local\Temp\3.exe"
          4⤵
          • Executes dropped EXE
          PID:4716
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 772
            5⤵
            • Program crash
            PID:5064
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4716 -ip 4716
    1⤵
      PID:2212

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe.log

      Filesize

      1KB

      MD5

      8ec831f3e3a3f77e4a7b9cd32b48384c

      SHA1

      d83f09fd87c5bd86e045873c231c14836e76a05c

      SHA256

      7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

      SHA512

      26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2.exe.log

      Filesize

      1KB

      MD5

      8ec831f3e3a3f77e4a7b9cd32b48384c

      SHA1

      d83f09fd87c5bd86e045873c231c14836e76a05c

      SHA256

      7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

      SHA512

      26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3.exe.log

      Filesize

      1KB

      MD5

      8ec831f3e3a3f77e4a7b9cd32b48384c

      SHA1

      d83f09fd87c5bd86e045873c231c14836e76a05c

      SHA256

      7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

      SHA512

      26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

    • C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe

      Filesize

      1.8MB

      MD5

      31431004556597a633f858c122c85b60

      SHA1

      fea5847bb6a5daae2688e349c827e30c51b4485f

      SHA256

      08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712

      SHA512

      7ea9edb6586a04f95de3522bd6a9aac661a04bfdd66af9c5d76fc38c5412deee8053db2e3906bfebbcae3d80141aee263bc73ac12de13f1f1f3df8f72241c8bd

    • C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe

      Filesize

      1.8MB

      MD5

      31431004556597a633f858c122c85b60

      SHA1

      fea5847bb6a5daae2688e349c827e30c51b4485f

      SHA256

      08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712

      SHA512

      7ea9edb6586a04f95de3522bd6a9aac661a04bfdd66af9c5d76fc38c5412deee8053db2e3906bfebbcae3d80141aee263bc73ac12de13f1f1f3df8f72241c8bd

    • C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe

      Filesize

      1.8MB

      MD5

      31431004556597a633f858c122c85b60

      SHA1

      fea5847bb6a5daae2688e349c827e30c51b4485f

      SHA256

      08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712

      SHA512

      7ea9edb6586a04f95de3522bd6a9aac661a04bfdd66af9c5d76fc38c5412deee8053db2e3906bfebbcae3d80141aee263bc73ac12de13f1f1f3df8f72241c8bd

    • C:\Users\Admin\AppData\Local\Temp\08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712.exe

      Filesize

      1.8MB

      MD5

      31431004556597a633f858c122c85b60

      SHA1

      fea5847bb6a5daae2688e349c827e30c51b4485f

      SHA256

      08771e45538f2faa1cc9b890f5dbea6ed4ccf1f0a2a7524029f2845ecc99b712

      SHA512

      7ea9edb6586a04f95de3522bd6a9aac661a04bfdd66af9c5d76fc38c5412deee8053db2e3906bfebbcae3d80141aee263bc73ac12de13f1f1f3df8f72241c8bd

    • C:\Users\Admin\AppData\Local\Temp\1.exe

      Filesize

      395KB

      MD5

      36c32cd064db3a4769d8b8bd99c8500e

      SHA1

      09d5ddbfa1b429db36dc0321b0767f783bc0cd3e

      SHA256

      fcc7fa3b71e82d54ed232db389161d5c22c6a3de5f6e68e4486d266f5df3399f

      SHA512

      1b7f9bebff9d89a6c8f7791fe1a0e267233e7814ee47808d7516acb24fe0fed2e7cd0e95b832f50b20a531563748f88795dd92c6b7ccd46782c4d5bd5ce2154e

    • C:\Users\Admin\AppData\Local\Temp\1.exe

      Filesize

      395KB

      MD5

      36c32cd064db3a4769d8b8bd99c8500e

      SHA1

      09d5ddbfa1b429db36dc0321b0767f783bc0cd3e

      SHA256

      fcc7fa3b71e82d54ed232db389161d5c22c6a3de5f6e68e4486d266f5df3399f

      SHA512

      1b7f9bebff9d89a6c8f7791fe1a0e267233e7814ee47808d7516acb24fe0fed2e7cd0e95b832f50b20a531563748f88795dd92c6b7ccd46782c4d5bd5ce2154e

    • C:\Users\Admin\AppData\Local\Temp\1.exe

      Filesize

      395KB

      MD5

      36c32cd064db3a4769d8b8bd99c8500e

      SHA1

      09d5ddbfa1b429db36dc0321b0767f783bc0cd3e

      SHA256

      fcc7fa3b71e82d54ed232db389161d5c22c6a3de5f6e68e4486d266f5df3399f

      SHA512

      1b7f9bebff9d89a6c8f7791fe1a0e267233e7814ee47808d7516acb24fe0fed2e7cd0e95b832f50b20a531563748f88795dd92c6b7ccd46782c4d5bd5ce2154e

    • C:\Users\Admin\AppData\Local\Temp\2.exe

      Filesize

      585KB

      MD5

      e1dd367f1baa8889afca69a79dd43abd

      SHA1

      786dc0378d1008490c9110cc30bcc6a11f6c3c3e

      SHA256

      56780e680f9185584bade0a79f8541ce4544e3f10a3d13b97d7a722b5809e6f9

      SHA512

      b618f0b5d0609b60b426a46c230bf11b4f514a83aff4e3a02e111cfbcb9df16fd10389e57817b4d51848f71acba879f09e0ad6831f586e3beab5acc1e53b781a

    • C:\Users\Admin\AppData\Local\Temp\2.exe

      Filesize

      585KB

      MD5

      e1dd367f1baa8889afca69a79dd43abd

      SHA1

      786dc0378d1008490c9110cc30bcc6a11f6c3c3e

      SHA256

      56780e680f9185584bade0a79f8541ce4544e3f10a3d13b97d7a722b5809e6f9

      SHA512

      b618f0b5d0609b60b426a46c230bf11b4f514a83aff4e3a02e111cfbcb9df16fd10389e57817b4d51848f71acba879f09e0ad6831f586e3beab5acc1e53b781a

    • C:\Users\Admin\AppData\Local\Temp\2.exe

      Filesize

      585KB

      MD5

      e1dd367f1baa8889afca69a79dd43abd

      SHA1

      786dc0378d1008490c9110cc30bcc6a11f6c3c3e

      SHA256

      56780e680f9185584bade0a79f8541ce4544e3f10a3d13b97d7a722b5809e6f9

      SHA512

      b618f0b5d0609b60b426a46c230bf11b4f514a83aff4e3a02e111cfbcb9df16fd10389e57817b4d51848f71acba879f09e0ad6831f586e3beab5acc1e53b781a

    • C:\Users\Admin\AppData\Local\Temp\3.exe

      Filesize

      583KB

      MD5

      d03c9c3cef97ff26426d84a056fbd5f6

      SHA1

      37bb280fd041626ff9b6ecdda4f323b91fa8445a

      SHA256

      d25a364cefd6108e009ebdf3225c5047d38af1145cc25b5895dffc7d5f7ee816

      SHA512

      37d7fe347165facdbd95935d154992999aee002e89f47a1b48f2cb741d8322fafbdc83b982c670dcf58369cb0893b4ac08e9be118313d1c364255f91052fcdfb

    • C:\Users\Admin\AppData\Local\Temp\3.exe

      Filesize

      583KB

      MD5

      d03c9c3cef97ff26426d84a056fbd5f6

      SHA1

      37bb280fd041626ff9b6ecdda4f323b91fa8445a

      SHA256

      d25a364cefd6108e009ebdf3225c5047d38af1145cc25b5895dffc7d5f7ee816

      SHA512

      37d7fe347165facdbd95935d154992999aee002e89f47a1b48f2cb741d8322fafbdc83b982c670dcf58369cb0893b4ac08e9be118313d1c364255f91052fcdfb

    • C:\Users\Admin\AppData\Local\Temp\3.exe

      Filesize

      583KB

      MD5

      d03c9c3cef97ff26426d84a056fbd5f6

      SHA1

      37bb280fd041626ff9b6ecdda4f323b91fa8445a

      SHA256

      d25a364cefd6108e009ebdf3225c5047d38af1145cc25b5895dffc7d5f7ee816

      SHA512

      37d7fe347165facdbd95935d154992999aee002e89f47a1b48f2cb741d8322fafbdc83b982c670dcf58369cb0893b4ac08e9be118313d1c364255f91052fcdfb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MicrosoftExplorer.exe

      Filesize

      583KB

      MD5

      d03c9c3cef97ff26426d84a056fbd5f6

      SHA1

      37bb280fd041626ff9b6ecdda4f323b91fa8445a

      SHA256

      d25a364cefd6108e009ebdf3225c5047d38af1145cc25b5895dffc7d5f7ee816

      SHA512

      37d7fe347165facdbd95935d154992999aee002e89f47a1b48f2cb741d8322fafbdc83b982c670dcf58369cb0893b4ac08e9be118313d1c364255f91052fcdfb

    • memory/1484-131-0x0000000005E90000-0x0000000006434000-memory.dmp

      Filesize

      5.6MB

    • memory/1484-132-0x00000000057E0000-0x0000000005872000-memory.dmp

      Filesize

      584KB

    • memory/1484-133-0x00000000058A0000-0x00000000058AA000-memory.dmp

      Filesize

      40KB

    • memory/1484-134-0x0000000005D10000-0x0000000005DAC000-memory.dmp

      Filesize

      624KB

    • memory/1484-130-0x0000000000C70000-0x0000000000E46000-memory.dmp

      Filesize

      1.8MB

    • memory/1712-186-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1712-195-0x0000000004F90000-0x0000000004FF6000-memory.dmp

      Filesize

      408KB

    • memory/1712-173-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1712-188-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1712-187-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1712-176-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1712-177-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1712-183-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1712-179-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1712-168-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1712-178-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/2080-142-0x0000000000400000-0x0000000000590000-memory.dmp

      Filesize

      1.6MB

    • memory/3588-151-0x0000000000DE0000-0x0000000000E4A000-memory.dmp

      Filesize

      424KB

    • memory/4184-156-0x0000000000F70000-0x0000000001008000-memory.dmp

      Filesize

      608KB

    • memory/4368-153-0x00000000000F0000-0x0000000000188000-memory.dmp

      Filesize

      608KB

    • memory/4716-164-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4716-169-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4924-162-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/4924-159-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/4924-189-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB