Analysis

  • max time kernel
    170s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    16-05-2022 13:00

General

  • Target

    0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe

  • Size

    1.8MB

  • MD5

    4e7eb50a75f8bf74751576cdd5381809

  • SHA1

    7e0dfbdd505b9451513b828e4d392e164fe566e9

  • SHA256

    0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

  • SHA512

    05b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3

Malware Config

Extracted

Family

warzonerat

C2

hive01.duckdns.org:8584

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • HiveRAT Payload 22 IoCs
  • Warzone RAT Payload 7 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops startup file 8 IoCs
  • Loads dropped DLL 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe
    "C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe
      "C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:784
      • C:\Users\Admin\AppData\Roaming\1.exe
        "C:\Users\Admin\AppData\Roaming\1.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1168
        • C:\Users\Admin\AppData\Roaming\1.exe
          "C:\Users\Admin\AppData\Roaming\1.exe"
          4⤵
          • Executes dropped EXE
          PID:1052
      • C:\Users\Admin\AppData\Roaming\3.exe
        "C:\Users\Admin\AppData\Roaming\3.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Users\Admin\AppData\Roaming\3.exe
          "C:\Users\Admin\AppData\Roaming\3.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1372
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 528
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1892
      • C:\Users\Admin\AppData\Roaming\2.exe
        "C:\Users\Admin\AppData\Roaming\2.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Users\Admin\AppData\Roaming\2.exe
          "C:\Users\Admin\AppData\Roaming\2.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe

    Filesize

    1.8MB

    MD5

    4e7eb50a75f8bf74751576cdd5381809

    SHA1

    7e0dfbdd505b9451513b828e4d392e164fe566e9

    SHA256

    0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

    SHA512

    05b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3

  • C:\Users\Admin\AppData\Roaming\1.exe

    Filesize

    393KB

    MD5

    ea33ef88c0e9cf45dcd70dc971c46e02

    SHA1

    68bad4331a4f108a7ced1dfe0e87a63fc5ded774

    SHA256

    6b0c966be8f3ebf3faf33582428a16b669d7571125108c7bbd8308882c55d709

    SHA512

    37c8c9404bedf6e032b1de937641b70586ad51a5a4e95fb08798a472bff5f3766123b98e4059d08f2608932d860325ab111e093276b1c71a9286b7e5d8211998

  • C:\Users\Admin\AppData\Roaming\1.exe

    Filesize

    393KB

    MD5

    ea33ef88c0e9cf45dcd70dc971c46e02

    SHA1

    68bad4331a4f108a7ced1dfe0e87a63fc5ded774

    SHA256

    6b0c966be8f3ebf3faf33582428a16b669d7571125108c7bbd8308882c55d709

    SHA512

    37c8c9404bedf6e032b1de937641b70586ad51a5a4e95fb08798a472bff5f3766123b98e4059d08f2608932d860325ab111e093276b1c71a9286b7e5d8211998

  • C:\Users\Admin\AppData\Roaming\1.exe

    Filesize

    393KB

    MD5

    ea33ef88c0e9cf45dcd70dc971c46e02

    SHA1

    68bad4331a4f108a7ced1dfe0e87a63fc5ded774

    SHA256

    6b0c966be8f3ebf3faf33582428a16b669d7571125108c7bbd8308882c55d709

    SHA512

    37c8c9404bedf6e032b1de937641b70586ad51a5a4e95fb08798a472bff5f3766123b98e4059d08f2608932d860325ab111e093276b1c71a9286b7e5d8211998

  • C:\Users\Admin\AppData\Roaming\2.exe

    Filesize

    585KB

    MD5

    bf400de7c5e0fb5fe483cb09c0ccb745

    SHA1

    46199385eb5aeccd6638d77a980c780344ac8ace

    SHA256

    fafbac3283f1c1b642284c1cee4c4111a165df2afce327798e739e1bb09984fc

    SHA512

    255c6fd43bd6e8954fec5e37b9c4aef9b210728073173ac51bc5ffaa6cb3cddab32d854c027ed7c0ff3e3d311e5b8e3c5a3ed3e1e08e8ccd60449485ec9bc93d

  • C:\Users\Admin\AppData\Roaming\2.exe

    Filesize

    585KB

    MD5

    bf400de7c5e0fb5fe483cb09c0ccb745

    SHA1

    46199385eb5aeccd6638d77a980c780344ac8ace

    SHA256

    fafbac3283f1c1b642284c1cee4c4111a165df2afce327798e739e1bb09984fc

    SHA512

    255c6fd43bd6e8954fec5e37b9c4aef9b210728073173ac51bc5ffaa6cb3cddab32d854c027ed7c0ff3e3d311e5b8e3c5a3ed3e1e08e8ccd60449485ec9bc93d

  • C:\Users\Admin\AppData\Roaming\2.exe

    Filesize

    585KB

    MD5

    bf400de7c5e0fb5fe483cb09c0ccb745

    SHA1

    46199385eb5aeccd6638d77a980c780344ac8ace

    SHA256

    fafbac3283f1c1b642284c1cee4c4111a165df2afce327798e739e1bb09984fc

    SHA512

    255c6fd43bd6e8954fec5e37b9c4aef9b210728073173ac51bc5ffaa6cb3cddab32d854c027ed7c0ff3e3d311e5b8e3c5a3ed3e1e08e8ccd60449485ec9bc93d

  • C:\Users\Admin\AppData\Roaming\3.exe

    Filesize

    584KB

    MD5

    d21695b6d9bdd7ed0e35a0c70ce38205

    SHA1

    33522e95507f48e68a981b1097bcbe0354e31c1a

    SHA256

    15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

    SHA512

    0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

  • C:\Users\Admin\AppData\Roaming\3.exe

    Filesize

    584KB

    MD5

    d21695b6d9bdd7ed0e35a0c70ce38205

    SHA1

    33522e95507f48e68a981b1097bcbe0354e31c1a

    SHA256

    15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

    SHA512

    0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

  • C:\Users\Admin\AppData\Roaming\3.exe

    Filesize

    584KB

    MD5

    d21695b6d9bdd7ed0e35a0c70ce38205

    SHA1

    33522e95507f48e68a981b1097bcbe0354e31c1a

    SHA256

    15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

    SHA512

    0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

  • \Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe

    Filesize

    1.8MB

    MD5

    4e7eb50a75f8bf74751576cdd5381809

    SHA1

    7e0dfbdd505b9451513b828e4d392e164fe566e9

    SHA256

    0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

    SHA512

    05b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3

  • \Users\Admin\AppData\Roaming\1.exe

    Filesize

    393KB

    MD5

    ea33ef88c0e9cf45dcd70dc971c46e02

    SHA1

    68bad4331a4f108a7ced1dfe0e87a63fc5ded774

    SHA256

    6b0c966be8f3ebf3faf33582428a16b669d7571125108c7bbd8308882c55d709

    SHA512

    37c8c9404bedf6e032b1de937641b70586ad51a5a4e95fb08798a472bff5f3766123b98e4059d08f2608932d860325ab111e093276b1c71a9286b7e5d8211998

  • \Users\Admin\AppData\Roaming\2.exe

    Filesize

    585KB

    MD5

    bf400de7c5e0fb5fe483cb09c0ccb745

    SHA1

    46199385eb5aeccd6638d77a980c780344ac8ace

    SHA256

    fafbac3283f1c1b642284c1cee4c4111a165df2afce327798e739e1bb09984fc

    SHA512

    255c6fd43bd6e8954fec5e37b9c4aef9b210728073173ac51bc5ffaa6cb3cddab32d854c027ed7c0ff3e3d311e5b8e3c5a3ed3e1e08e8ccd60449485ec9bc93d

  • \Users\Admin\AppData\Roaming\3.exe

    Filesize

    584KB

    MD5

    d21695b6d9bdd7ed0e35a0c70ce38205

    SHA1

    33522e95507f48e68a981b1097bcbe0354e31c1a

    SHA256

    15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

    SHA512

    0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

  • \Users\Admin\AppData\Roaming\3.exe

    Filesize

    584KB

    MD5

    d21695b6d9bdd7ed0e35a0c70ce38205

    SHA1

    33522e95507f48e68a981b1097bcbe0354e31c1a

    SHA256

    15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

    SHA512

    0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

  • \Users\Admin\AppData\Roaming\3.exe

    Filesize

    584KB

    MD5

    d21695b6d9bdd7ed0e35a0c70ce38205

    SHA1

    33522e95507f48e68a981b1097bcbe0354e31c1a

    SHA256

    15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

    SHA512

    0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

  • \Users\Admin\AppData\Roaming\3.exe

    Filesize

    584KB

    MD5

    d21695b6d9bdd7ed0e35a0c70ce38205

    SHA1

    33522e95507f48e68a981b1097bcbe0354e31c1a

    SHA256

    15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

    SHA512

    0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

  • \Users\Admin\AppData\Roaming\3.exe

    Filesize

    584KB

    MD5

    d21695b6d9bdd7ed0e35a0c70ce38205

    SHA1

    33522e95507f48e68a981b1097bcbe0354e31c1a

    SHA256

    15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

    SHA512

    0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

  • \Users\Admin\AppData\Roaming\3.exe

    Filesize

    584KB

    MD5

    d21695b6d9bdd7ed0e35a0c70ce38205

    SHA1

    33522e95507f48e68a981b1097bcbe0354e31c1a

    SHA256

    15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

    SHA512

    0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

  • memory/784-70-0x0000000000590000-0x0000000000598000-memory.dmp

    Filesize

    32KB

  • memory/784-59-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/784-58-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/784-63-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/784-69-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/784-64-0x000000000058AF7E-mapping.dmp

  • memory/784-61-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/784-67-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/784-62-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/836-113-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-138-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-114-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-136-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-112-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-145-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-147-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-146-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-142-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-121-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-135-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-137-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-117-0x000000000044C85E-mapping.dmp

  • memory/836-123-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-108-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-109-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/836-111-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1052-104-0x0000000000405CE2-mapping.dmp

  • memory/1052-94-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1052-98-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1052-156-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1052-101-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1052-93-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1052-103-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1052-102-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1052-99-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1052-96-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB

  • memory/1168-78-0x0000000000AD0000-0x0000000000B38000-memory.dmp

    Filesize

    416KB

  • memory/1168-83-0x0000000000300000-0x0000000000362000-memory.dmp

    Filesize

    392KB

  • memory/1168-73-0x0000000000000000-mapping.dmp

  • memory/1372-127-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1372-124-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1372-126-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1372-128-0x000000000044CB3E-mapping.dmp

  • memory/1372-131-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1372-133-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1372-125-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1372-116-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1672-56-0x0000000005040000-0x0000000005210000-memory.dmp

    Filesize

    1.8MB

  • memory/1672-54-0x0000000000E90000-0x0000000001066000-memory.dmp

    Filesize

    1.8MB

  • memory/1672-55-0x0000000075AE1000-0x0000000075AE3000-memory.dmp

    Filesize

    8KB

  • memory/1892-153-0x0000000000000000-mapping.dmp

  • memory/1932-89-0x0000000001270000-0x0000000001308000-memory.dmp

    Filesize

    608KB

  • memory/1932-92-0x00000000011D0000-0x0000000001262000-memory.dmp

    Filesize

    584KB

  • memory/1932-86-0x0000000000000000-mapping.dmp

  • memory/2036-82-0x0000000000BA0000-0x0000000000C38000-memory.dmp

    Filesize

    608KB

  • memory/2036-77-0x0000000000000000-mapping.dmp

  • memory/2036-90-0x0000000000890000-0x0000000000922000-memory.dmp

    Filesize

    584KB