Analysis
-
max time kernel
160s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:54
Static task
static1
Behavioral task
behavioral1
Sample
ISF form == 20030316 M#EGLV003090032432.scr
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ISF form == 20030316 M#EGLV003090032432.scr
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Invoice & Packing list EGLV003090032432.scr
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Invoice & Packing list EGLV003090032432.scr
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
VGM ==#EGLV003090032432.scr
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
VGM ==#EGLV003090032432.scr
Resource
win10v2004-20220414-en
General
-
Target
Invoice & Packing list EGLV003090032432.scr
-
Size
571KB
-
MD5
165255e7fef985bb6a76cdd5dc0f3efe
-
SHA1
4d4f455814cb607ae530fa589c6d1d3ed9e4173d
-
SHA256
3266b45cbefcbd64ebc0b8e2a120a98e5fd72b94135c33a2f36aa510d9dbc207
-
SHA512
10bfa4823ab3207b6a2ee0f9ddc0163ae7f5ebf12bf8589a9c2c72c59b31426b31699baacbf0b57ea4aeea897e8bf28cb9c3ffc4863b2c0ebba2e64ce636f818
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Executes dropped EXE 2 IoCs
Processes:
images.exeimages.exepid process 5076 images.exe 1076 images.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Invoice & Packing list EGLV003090032432.scrdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" Invoice & Packing list EGLV003090032432.scr -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Invoice & Packing list EGLV003090032432.scrimages.exedescription pid process target process PID 3396 set thread context of 2216 3396 Invoice & Packing list EGLV003090032432.scr Invoice & Packing list EGLV003090032432.scr PID 5076 set thread context of 1076 5076 images.exe images.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Invoice & Packing list EGLV003090032432.scrimages.exepowershell.exepowershell.exepid process 3396 Invoice & Packing list EGLV003090032432.scr 3396 Invoice & Packing list EGLV003090032432.scr 5076 images.exe 5076 images.exe 4132 powershell.exe 4132 powershell.exe 4756 powershell.exe 4756 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Invoice & Packing list EGLV003090032432.scrimages.exepid process 3396 Invoice & Packing list EGLV003090032432.scr 5076 images.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4132 powershell.exe Token: SeDebugPrivilege 4756 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Invoice & Packing list EGLV003090032432.scrInvoice & Packing list EGLV003090032432.scrimages.exeimages.exedescription pid process target process PID 3396 wrote to memory of 2216 3396 Invoice & Packing list EGLV003090032432.scr Invoice & Packing list EGLV003090032432.scr PID 3396 wrote to memory of 2216 3396 Invoice & Packing list EGLV003090032432.scr Invoice & Packing list EGLV003090032432.scr PID 3396 wrote to memory of 2216 3396 Invoice & Packing list EGLV003090032432.scr Invoice & Packing list EGLV003090032432.scr PID 2216 wrote to memory of 4132 2216 Invoice & Packing list EGLV003090032432.scr powershell.exe PID 2216 wrote to memory of 4132 2216 Invoice & Packing list EGLV003090032432.scr powershell.exe PID 2216 wrote to memory of 4132 2216 Invoice & Packing list EGLV003090032432.scr powershell.exe PID 2216 wrote to memory of 5076 2216 Invoice & Packing list EGLV003090032432.scr images.exe PID 2216 wrote to memory of 5076 2216 Invoice & Packing list EGLV003090032432.scr images.exe PID 2216 wrote to memory of 5076 2216 Invoice & Packing list EGLV003090032432.scr images.exe PID 5076 wrote to memory of 1076 5076 images.exe images.exe PID 5076 wrote to memory of 1076 5076 images.exe images.exe PID 5076 wrote to memory of 1076 5076 images.exe images.exe PID 1076 wrote to memory of 4756 1076 images.exe powershell.exe PID 1076 wrote to memory of 4756 1076 images.exe powershell.exe PID 1076 wrote to memory of 4756 1076 images.exe powershell.exe PID 1076 wrote to memory of 4768 1076 images.exe cmd.exe PID 1076 wrote to memory of 4768 1076 images.exe cmd.exe PID 1076 wrote to memory of 4768 1076 images.exe cmd.exe PID 1076 wrote to memory of 4768 1076 images.exe cmd.exe PID 1076 wrote to memory of 4768 1076 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Invoice & Packing list EGLV003090032432.scr"C:\Users\Admin\AppData\Local\Temp\Invoice & Packing list EGLV003090032432.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Invoice & Packing list EGLV003090032432.scr"C:\Users\Admin\AppData\Local\Temp\Invoice & Packing list EGLV003090032432.scr" /S2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeFilesize
571KB
MD5165255e7fef985bb6a76cdd5dc0f3efe
SHA14d4f455814cb607ae530fa589c6d1d3ed9e4173d
SHA2563266b45cbefcbd64ebc0b8e2a120a98e5fd72b94135c33a2f36aa510d9dbc207
SHA51210bfa4823ab3207b6a2ee0f9ddc0163ae7f5ebf12bf8589a9c2c72c59b31426b31699baacbf0b57ea4aeea897e8bf28cb9c3ffc4863b2c0ebba2e64ce636f818
-
C:\ProgramData\images.exeFilesize
571KB
MD5165255e7fef985bb6a76cdd5dc0f3efe
SHA14d4f455814cb607ae530fa589c6d1d3ed9e4173d
SHA2563266b45cbefcbd64ebc0b8e2a120a98e5fd72b94135c33a2f36aa510d9dbc207
SHA51210bfa4823ab3207b6a2ee0f9ddc0163ae7f5ebf12bf8589a9c2c72c59b31426b31699baacbf0b57ea4aeea897e8bf28cb9c3ffc4863b2c0ebba2e64ce636f818
-
C:\ProgramData\images.exeFilesize
571KB
MD5165255e7fef985bb6a76cdd5dc0f3efe
SHA14d4f455814cb607ae530fa589c6d1d3ed9e4173d
SHA2563266b45cbefcbd64ebc0b8e2a120a98e5fd72b94135c33a2f36aa510d9dbc207
SHA51210bfa4823ab3207b6a2ee0f9ddc0163ae7f5ebf12bf8589a9c2c72c59b31426b31699baacbf0b57ea4aeea897e8bf28cb9c3ffc4863b2c0ebba2e64ce636f818
-
memory/1076-136-0x0000000000000000-mapping.dmp
-
memory/2216-130-0x0000000000000000-mapping.dmp
-
memory/3396-131-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB
-
memory/4132-152-0x0000000007850000-0x0000000007ECA000-memory.dmpFilesize
6.5MB
-
memory/4132-156-0x0000000007440000-0x000000000744E000-memory.dmpFilesize
56KB
-
memory/4132-148-0x00000000064D0000-0x0000000006502000-memory.dmpFilesize
200KB
-
memory/4132-139-0x0000000004960000-0x0000000004996000-memory.dmpFilesize
216KB
-
memory/4132-140-0x0000000005150000-0x0000000005778000-memory.dmpFilesize
6.2MB
-
memory/4132-141-0x0000000004F60000-0x0000000004F82000-memory.dmpFilesize
136KB
-
memory/4132-142-0x0000000005830000-0x0000000005896000-memory.dmpFilesize
408KB
-
memory/4132-143-0x0000000005910000-0x0000000005976000-memory.dmpFilesize
408KB
-
memory/4132-132-0x0000000000000000-mapping.dmp
-
memory/4132-150-0x00000000064B0000-0x00000000064CE000-memory.dmpFilesize
120KB
-
memory/4132-146-0x0000000005F00000-0x0000000005F1E000-memory.dmpFilesize
120KB
-
memory/4132-149-0x00000000745F0000-0x000000007463C000-memory.dmpFilesize
304KB
-
memory/4756-144-0x0000000000000000-mapping.dmp
-
memory/4756-151-0x00000000745F0000-0x000000007463C000-memory.dmpFilesize
304KB
-
memory/4756-153-0x00000000070F0000-0x000000000710A000-memory.dmpFilesize
104KB
-
memory/4756-154-0x0000000007160000-0x000000000716A000-memory.dmpFilesize
40KB
-
memory/4756-155-0x0000000007370000-0x0000000007406000-memory.dmpFilesize
600KB
-
memory/4756-157-0x0000000007430000-0x000000000744A000-memory.dmpFilesize
104KB
-
memory/4756-158-0x0000000007410000-0x0000000007418000-memory.dmpFilesize
32KB
-
memory/4768-147-0x0000000000D50000-0x0000000000D51000-memory.dmpFilesize
4KB
-
memory/4768-145-0x0000000000000000-mapping.dmp
-
memory/5076-138-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB
-
memory/5076-133-0x0000000000000000-mapping.dmp