Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 01:37

General

  • Target

    Quotation-937847836-178474.exe

  • Size

    188KB

  • MD5

    bbc4ffcf3ffdd24fda14f1d234966e33

  • SHA1

    9d4d3b412493806601fa61492d0b58f06bce3ee1

  • SHA256

    4a1f7dc3d33366c303e8fb2c7c44d4929d5898f219bcf952bafba336b8056e91

  • SHA512

    f1e33bee03ddaaee6682b351a522ea3a8759b324a1aefeb885ae5407d78b18053f21336d247cb1b9ddbb7c0d2b00c85c44165c04b47191650812913850d46f3b

Malware Config

Extracted

Family

warzonerat

C2

newzone.from-ne.com:3200

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Warzone RAT Payload 3 IoCs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation-937847836-178474.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation-937847836-178474.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks computer location settings
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HhnIFenoEC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1DAA.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4968
    • C:\Users\Admin\AppData\Local\Temp\Quotation-937847836-178474.exe
      "C:\Users\Admin\AppData\Local\Temp\Quotation-937847836-178474.exe"
      2⤵
        PID:4012
      • C:\Users\Admin\AppData\Local\Temp\Quotation-937847836-178474.exe
        "C:\Users\Admin\AppData\Local\Temp\Quotation-937847836-178474.exe"
        2⤵
          PID:1508

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp1DAA.tmp

        Filesize

        1KB

        MD5

        985639ce4805fccf79eb96f8ae67eafe

        SHA1

        a16ea18d873eebcd15f06239da8416e8c5e0bef5

        SHA256

        85114fb9a809cf01b269f84b7c3c2d69642414f8d1917298b57dcbf521cd000a

        SHA512

        ca8eec5ae162ec38d83bfeaedaada74afa0428007d3ca61161640f45857bcaada7b4b50bda369b1a100e2fa78364e0e35446c660bc59ac3d318ccde32fffb813

      • memory/1508-134-0x0000000000000000-mapping.dmp

      • memory/1508-135-0x0000000000400000-0x0000000000553000-memory.dmp

        Filesize

        1.3MB

      • memory/1508-137-0x0000000000400000-0x0000000000553000-memory.dmp

        Filesize

        1.3MB

      • memory/1508-138-0x0000000000400000-0x0000000000553000-memory.dmp

        Filesize

        1.3MB

      • memory/4012-133-0x0000000000000000-mapping.dmp

      • memory/4892-130-0x0000000075150000-0x0000000075701000-memory.dmp

        Filesize

        5.7MB

      • memory/4968-131-0x0000000000000000-mapping.dmp