Analysis

  • max time kernel
    154s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    16-05-2022 13:00

General

  • Target

    0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe

  • Size

    1.8MB

  • MD5

    4e7eb50a75f8bf74751576cdd5381809

  • SHA1

    7e0dfbdd505b9451513b828e4d392e164fe566e9

  • SHA256

    0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

  • SHA512

    05b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3

Malware Config

Extracted

Family

warzonerat

C2

hive01.duckdns.org:8584

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • HiveRAT Payload 12 IoCs
  • Warzone RAT Payload 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 8 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe
    "C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe
      "C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe"
      2⤵
      • Executes dropped EXE
      PID:804
    • C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe
      "C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Users\Admin\AppData\Roaming\1.exe
        "C:\Users\Admin\AppData\Roaming\1.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:728
        • C:\Users\Admin\AppData\Roaming\1.exe
          "C:\Users\Admin\AppData\Roaming\1.exe"
          4⤵
          • Executes dropped EXE
          PID:1676
      • C:\Users\Admin\AppData\Roaming\2.exe
        "C:\Users\Admin\AppData\Roaming\2.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Users\Admin\AppData\Roaming\2.exe
          "C:\Users\Admin\AppData\Roaming\2.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:3396
      • C:\Users\Admin\AppData\Roaming\3.exe
        "C:\Users\Admin\AppData\Roaming\3.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1424
        • C:\Users\Admin\AppData\Roaming\3.exe
          "C:\Users\Admin\AppData\Roaming\3.exe"
          4⤵
          • Executes dropped EXE
          PID:2492
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 764
            5⤵
            • Program crash
            PID:2664
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2492 -ip 2492
    1⤵
      PID:4916

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe.log

      Filesize

      1KB

      MD5

      8ec831f3e3a3f77e4a7b9cd32b48384c

      SHA1

      d83f09fd87c5bd86e045873c231c14836e76a05c

      SHA256

      7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

      SHA512

      26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

    • C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe

      Filesize

      1.8MB

      MD5

      4e7eb50a75f8bf74751576cdd5381809

      SHA1

      7e0dfbdd505b9451513b828e4d392e164fe566e9

      SHA256

      0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

      SHA512

      05b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3

    • C:\Users\Admin\AppData\Local\Temp\0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c.exe

      Filesize

      1.8MB

      MD5

      4e7eb50a75f8bf74751576cdd5381809

      SHA1

      7e0dfbdd505b9451513b828e4d392e164fe566e9

      SHA256

      0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

      SHA512

      05b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3

    • C:\Users\Admin\AppData\Roaming\1.exe

      Filesize

      393KB

      MD5

      ea33ef88c0e9cf45dcd70dc971c46e02

      SHA1

      68bad4331a4f108a7ced1dfe0e87a63fc5ded774

      SHA256

      6b0c966be8f3ebf3faf33582428a16b669d7571125108c7bbd8308882c55d709

      SHA512

      37c8c9404bedf6e032b1de937641b70586ad51a5a4e95fb08798a472bff5f3766123b98e4059d08f2608932d860325ab111e093276b1c71a9286b7e5d8211998

    • C:\Users\Admin\AppData\Roaming\1.exe

      Filesize

      393KB

      MD5

      ea33ef88c0e9cf45dcd70dc971c46e02

      SHA1

      68bad4331a4f108a7ced1dfe0e87a63fc5ded774

      SHA256

      6b0c966be8f3ebf3faf33582428a16b669d7571125108c7bbd8308882c55d709

      SHA512

      37c8c9404bedf6e032b1de937641b70586ad51a5a4e95fb08798a472bff5f3766123b98e4059d08f2608932d860325ab111e093276b1c71a9286b7e5d8211998

    • C:\Users\Admin\AppData\Roaming\1.exe

      Filesize

      393KB

      MD5

      ea33ef88c0e9cf45dcd70dc971c46e02

      SHA1

      68bad4331a4f108a7ced1dfe0e87a63fc5ded774

      SHA256

      6b0c966be8f3ebf3faf33582428a16b669d7571125108c7bbd8308882c55d709

      SHA512

      37c8c9404bedf6e032b1de937641b70586ad51a5a4e95fb08798a472bff5f3766123b98e4059d08f2608932d860325ab111e093276b1c71a9286b7e5d8211998

    • C:\Users\Admin\AppData\Roaming\2.exe

      Filesize

      585KB

      MD5

      bf400de7c5e0fb5fe483cb09c0ccb745

      SHA1

      46199385eb5aeccd6638d77a980c780344ac8ace

      SHA256

      fafbac3283f1c1b642284c1cee4c4111a165df2afce327798e739e1bb09984fc

      SHA512

      255c6fd43bd6e8954fec5e37b9c4aef9b210728073173ac51bc5ffaa6cb3cddab32d854c027ed7c0ff3e3d311e5b8e3c5a3ed3e1e08e8ccd60449485ec9bc93d

    • C:\Users\Admin\AppData\Roaming\2.exe

      Filesize

      585KB

      MD5

      bf400de7c5e0fb5fe483cb09c0ccb745

      SHA1

      46199385eb5aeccd6638d77a980c780344ac8ace

      SHA256

      fafbac3283f1c1b642284c1cee4c4111a165df2afce327798e739e1bb09984fc

      SHA512

      255c6fd43bd6e8954fec5e37b9c4aef9b210728073173ac51bc5ffaa6cb3cddab32d854c027ed7c0ff3e3d311e5b8e3c5a3ed3e1e08e8ccd60449485ec9bc93d

    • C:\Users\Admin\AppData\Roaming\2.exe

      Filesize

      585KB

      MD5

      bf400de7c5e0fb5fe483cb09c0ccb745

      SHA1

      46199385eb5aeccd6638d77a980c780344ac8ace

      SHA256

      fafbac3283f1c1b642284c1cee4c4111a165df2afce327798e739e1bb09984fc

      SHA512

      255c6fd43bd6e8954fec5e37b9c4aef9b210728073173ac51bc5ffaa6cb3cddab32d854c027ed7c0ff3e3d311e5b8e3c5a3ed3e1e08e8ccd60449485ec9bc93d

    • C:\Users\Admin\AppData\Roaming\3.exe

      Filesize

      584KB

      MD5

      d21695b6d9bdd7ed0e35a0c70ce38205

      SHA1

      33522e95507f48e68a981b1097bcbe0354e31c1a

      SHA256

      15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

      SHA512

      0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

    • C:\Users\Admin\AppData\Roaming\3.exe

      Filesize

      584KB

      MD5

      d21695b6d9bdd7ed0e35a0c70ce38205

      SHA1

      33522e95507f48e68a981b1097bcbe0354e31c1a

      SHA256

      15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

      SHA512

      0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

    • C:\Users\Admin\AppData\Roaming\3.exe

      Filesize

      584KB

      MD5

      d21695b6d9bdd7ed0e35a0c70ce38205

      SHA1

      33522e95507f48e68a981b1097bcbe0354e31c1a

      SHA256

      15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c

      SHA512

      0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f

    • memory/728-145-0x00000000006B0000-0x0000000000718000-memory.dmp

      Filesize

      416KB

    • memory/796-130-0x0000000000760000-0x0000000000936000-memory.dmp

      Filesize

      1.8MB

    • memory/796-134-0x0000000005EB0000-0x0000000005F4C000-memory.dmp

      Filesize

      624KB

    • memory/796-133-0x00000000052E0000-0x00000000052EA000-memory.dmp

      Filesize

      40KB

    • memory/796-132-0x0000000005220000-0x00000000052B2000-memory.dmp

      Filesize

      584KB

    • memory/796-131-0x0000000005730000-0x0000000005CD4000-memory.dmp

      Filesize

      5.6MB

    • memory/1080-151-0x0000000000B40000-0x0000000000BD8000-memory.dmp

      Filesize

      608KB

    • memory/1424-152-0x0000000000180000-0x0000000000218000-memory.dmp

      Filesize

      608KB

    • memory/1676-154-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1676-188-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1676-167-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/2492-163-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/2492-166-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/2936-138-0x0000000000400000-0x0000000000590000-memory.dmp

      Filesize

      1.6MB

    • memory/3396-171-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3396-158-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3396-169-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3396-170-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3396-172-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3396-161-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3396-176-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3396-179-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3396-180-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3396-181-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3396-187-0x0000000004F50000-0x0000000004FB6000-memory.dmp

      Filesize

      408KB