Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 19:18

General

  • Target

    DOC_DELI.exe

  • Size

    976KB

  • MD5

    e48a6f316e081f116c1b9c812f35694d

  • SHA1

    b8c3e97deebce1cfaa821e8ef822754b7c0fdec0

  • SHA256

    adbaaaedf5553fca319364ec9f2685b546fdc135352e96654c692b12e7cd40ed

  • SHA512

    b6dbc3ec04fffe634dde9d990e9035e1f7c9a79c59a1ebb4a9bade12fa70f01ba732ae276d02662ba671bf716d3450c75c922ebdf8821c7ac3c35f4a7010cfba

Malware Config

Extracted

Family

warzonerat

C2

76.8.53.133:1198

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.crestftb.com
  • Port:
    587
  • Username:
    ikmero@crestftb.com
  • Password:
    BRIAN22@1234567891011
  • Email To:
    snakelogger@crestftb.com

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 3 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe
    "C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe
      "C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe"
      2⤵
        PID:4108
      • C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe
        "C:\Users\Admin\AppData\Local\Temp\DOC_DELI.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3920
        • C:\Users\Admin\AppData\Local\Temp\all crypto stealer.exe
          "C:\Users\Admin\AppData\Local\Temp\all crypto stealer.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Adds Run key to start application
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of WriteProcessMemory
          PID:3152
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" [bool](([System.Security.Principal.WindowsIdentity]::GetCurrent()).groups -match 'S-1-5-32-544')
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4764
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1468
          • C:\Users\Admin\AppData\Roaming\.exe
            "C:\Users\Admin\AppData\Roaming\.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of WriteProcessMemory
            PID:2192
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" [bool](([System.Security.Principal.WindowsIdentity]::GetCurrent()).groups -match 'S-1-5-32-544')
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4784
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5104
        • C:\Users\Admin\AppData\Local\Temp\nerronewsn.exe
          "C:\Users\Admin\AppData\Local\Temp\nerronewsn.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2228
        • C:\Users\Admin\AppData\Local\Temp\warpoison.exe
          "C:\Users\Admin\AppData\Local\Temp\warpoison.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4148
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell Add-MpPreference -ExclusionPath C:\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:564
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\windowsupdater.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1688
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\windowsupdater.exe"
              5⤵
                PID:5052
            • C:\ProgramData\windowsupdater.exe
              "C:\ProgramData\windowsupdater.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2752
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell Add-MpPreference -ExclusionPath C:\
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:400
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe"
                5⤵
                  PID:1180

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\windowsupdater.exe
          Filesize

          152KB

          MD5

          37551bca5a31bf04580585fb78bb460a

          SHA1

          d6020915fb1061775a6e36c5d5f22e1e974af70e

          SHA256

          4ed3c116cd9e875131f14d9dfef6dc345192d0b245615536da1cfabc893e3275

          SHA512

          3e386f42005ac5308b9963bb4505280e3afcd8ec1e24a0c52a4eb836e553a8ebe32e2d57b643bf1044b4e0405879b9a4e026522c9f4415fbad75d059f3a10af9

        • C:\ProgramData\windowsupdater.exe
          Filesize

          152KB

          MD5

          37551bca5a31bf04580585fb78bb460a

          SHA1

          d6020915fb1061775a6e36c5d5f22e1e974af70e

          SHA256

          4ed3c116cd9e875131f14d9dfef6dc345192d0b245615536da1cfabc893e3275

          SHA512

          3e386f42005ac5308b9963bb4505280e3afcd8ec1e24a0c52a4eb836e553a8ebe32e2d57b643bf1044b4e0405879b9a4e026522c9f4415fbad75d059f3a10af9

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DOC_DELI.exe.log
          Filesize

          1KB

          MD5

          e08f822522c617a40840c62e4b0fb45e

          SHA1

          ae516dca4da5234be6676d3f234c19ec55725be7

          SHA256

          bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7

          SHA512

          894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
          Filesize

          1KB

          MD5

          28854213fdaa59751b2b4cfe772289cc

          SHA1

          fa7058052780f4b856dc2d56b88163ed55deb6ab

          SHA256

          7c65fe71d47e0de69a15b95d1ee4b433c07a1d6f00f37dd32aee3666bb84a915

          SHA512

          1e2c928242bdef287b1e8afe8c37427cfd3b7a83c37d4e00e45bcbaa38c9b0bf96f869a062c9bc6bb58ecd36e687a69b21d5b07803e6615a9b632922c1c5ace4

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          12KB

          MD5

          6a1efada499dd8da980a50102c0520b0

          SHA1

          20ea98c6efa3c9a951032768c36239b2a181fd8e

          SHA256

          fff50712ebb3eb2a094b2cae6a167064a06ad0fef6099d80c9c15d933356ac38

          SHA512

          3fdf286d2aa074752542b709037109500632448a11ed6fa0e9fcd46b5cda6f17fad76c8d46dde88a5c3986a0190755b5f7cccf1e4eb52912c183d2293b13668b

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          18KB

          MD5

          e8dcb9c32cd90181220df6e4e631becf

          SHA1

          082507584e2838f07aca1c7aca7d5bf29b80c157

          SHA256

          15090d46ba64d0f40fed3ede39b1f66269fef3f449924498f7434018343c2373

          SHA512

          3501d536484a371b02c11935feb894902d79b3f912295853d51798baef566af59c1880c28db228e0a6c6df0e687166731cd18eafb1acee523fef1745f86958ff

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          18KB

          MD5

          04af92aebdc2131b01643078bdf4d856

          SHA1

          fe95792684a6538040b92f9b59d9c6b790f76472

          SHA256

          b3068f3c52c3348df612de990e0e5f966b2add495affaa8ce52c191bbe26f526

          SHA512

          32faf027c98f6055aa724794b247022aadd4dcee77b859717f45594d80a9ff49b5b7734ce6690f69c5b77404fb1b27558c2af7b6056641f4b4efd4b00f79a9c7

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          18KB

          MD5

          04af92aebdc2131b01643078bdf4d856

          SHA1

          fe95792684a6538040b92f9b59d9c6b790f76472

          SHA256

          b3068f3c52c3348df612de990e0e5f966b2add495affaa8ce52c191bbe26f526

          SHA512

          32faf027c98f6055aa724794b247022aadd4dcee77b859717f45594d80a9ff49b5b7734ce6690f69c5b77404fb1b27558c2af7b6056641f4b4efd4b00f79a9c7

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          Filesize

          12KB

          MD5

          ba3bf09d4e615715b3c5cd983a6403d8

          SHA1

          bc86a29e8af774a4149d92953a73c48591f0fca8

          SHA256

          ee542f3fe08ce4c81f89d3bd2a6e5a2db15b0698872c6f2b31ee73d9340636f2

          SHA512

          5c34a473b7a7243a530a10ca3c516d70a428dc00cb3cc02c824b0cddec673f3b5dd08e370db60c0a4fa8f021daa61cb68c9a53242c8b245b25294435f52ab478

        • C:\Users\Admin\AppData\Local\Temp\all crypto stealer.exe
          Filesize

          18KB

          MD5

          50da867177fb32fc3c1a5c27afd24d21

          SHA1

          f7cb78d20dcd982f7e2c4c3a6761e1587c82560c

          SHA256

          1655025121085518a3dd9259d54c15107db597ea36c97433ed0609e87894df73

          SHA512

          29f30f7ca3dedea8f34e9ce3f9303d09eaec5aac6ef1ca0de89c5705790045e448854fa82f2ce15684f321552d2a4061f4c3cb373d73cc22b3345ad5dcc62356

        • C:\Users\Admin\AppData\Local\Temp\all crypto stealer.exe
          Filesize

          18KB

          MD5

          50da867177fb32fc3c1a5c27afd24d21

          SHA1

          f7cb78d20dcd982f7e2c4c3a6761e1587c82560c

          SHA256

          1655025121085518a3dd9259d54c15107db597ea36c97433ed0609e87894df73

          SHA512

          29f30f7ca3dedea8f34e9ce3f9303d09eaec5aac6ef1ca0de89c5705790045e448854fa82f2ce15684f321552d2a4061f4c3cb373d73cc22b3345ad5dcc62356

        • C:\Users\Admin\AppData\Local\Temp\nerronewsn.exe
          Filesize

          127KB

          MD5

          755b1262aa6b3a6b267b41580c7e8972

          SHA1

          b2f0f7293cf7162895df2976eecfc1084eeba2fc

          SHA256

          d185986cb9b369a5f5d641c80d09adc878771b33ab020879629fb570c2cd7cec

          SHA512

          d6fa491a7e4ad296532bbff04af9afd61e6a7edcceba7f45f3e9e132678cb644737f392f4a62337211e3a6c3b66ecd5c6d84c6ad251125d76b5766da9a510c42

        • C:\Users\Admin\AppData\Local\Temp\nerronewsn.exe
          Filesize

          127KB

          MD5

          755b1262aa6b3a6b267b41580c7e8972

          SHA1

          b2f0f7293cf7162895df2976eecfc1084eeba2fc

          SHA256

          d185986cb9b369a5f5d641c80d09adc878771b33ab020879629fb570c2cd7cec

          SHA512

          d6fa491a7e4ad296532bbff04af9afd61e6a7edcceba7f45f3e9e132678cb644737f392f4a62337211e3a6c3b66ecd5c6d84c6ad251125d76b5766da9a510c42

        • C:\Users\Admin\AppData\Local\Temp\warpoison.exe
          Filesize

          152KB

          MD5

          37551bca5a31bf04580585fb78bb460a

          SHA1

          d6020915fb1061775a6e36c5d5f22e1e974af70e

          SHA256

          4ed3c116cd9e875131f14d9dfef6dc345192d0b245615536da1cfabc893e3275

          SHA512

          3e386f42005ac5308b9963bb4505280e3afcd8ec1e24a0c52a4eb836e553a8ebe32e2d57b643bf1044b4e0405879b9a4e026522c9f4415fbad75d059f3a10af9

        • C:\Users\Admin\AppData\Local\Temp\warpoison.exe
          Filesize

          152KB

          MD5

          37551bca5a31bf04580585fb78bb460a

          SHA1

          d6020915fb1061775a6e36c5d5f22e1e974af70e

          SHA256

          4ed3c116cd9e875131f14d9dfef6dc345192d0b245615536da1cfabc893e3275

          SHA512

          3e386f42005ac5308b9963bb4505280e3afcd8ec1e24a0c52a4eb836e553a8ebe32e2d57b643bf1044b4e0405879b9a4e026522c9f4415fbad75d059f3a10af9

        • C:\Users\Admin\AppData\Roaming\.exe
          Filesize

          38.7MB

          MD5

          a6d70b31418be484a2e60eb0ca55daf1

          SHA1

          9a2a7aeb781aa4850765d417bdd1934dfb553530

          SHA256

          c986f9c4772042a18274d7063c02467bf9b5763a3f3de4abe018bf6f2b826574

          SHA512

          1cfeded32c8463e47f0e9681d322761a8d75b2722dd218108e3f2e047e866badd4371af7da532bf83bf958a1d52f71a12e268774e082393b569c234e79f39796

        • C:\Users\Admin\AppData\Roaming\.exe
          Filesize

          38.7MB

          MD5

          a6d70b31418be484a2e60eb0ca55daf1

          SHA1

          9a2a7aeb781aa4850765d417bdd1934dfb553530

          SHA256

          c986f9c4772042a18274d7063c02467bf9b5763a3f3de4abe018bf6f2b826574

          SHA512

          1cfeded32c8463e47f0e9681d322761a8d75b2722dd218108e3f2e047e866badd4371af7da532bf83bf958a1d52f71a12e268774e082393b569c234e79f39796

        • memory/400-173-0x0000000000000000-mapping.dmp
        • memory/400-177-0x0000000071D70000-0x0000000071DBC000-memory.dmp
          Filesize

          304KB

        • memory/564-179-0x0000000007FE0000-0x0000000007FFA000-memory.dmp
          Filesize

          104KB

        • memory/564-157-0x0000000000000000-mapping.dmp
        • memory/564-166-0x0000000007BB0000-0x0000000007BE2000-memory.dmp
          Filesize

          200KB

        • memory/564-180-0x0000000007FD0000-0x0000000007FD8000-memory.dmp
          Filesize

          32KB

        • memory/564-167-0x0000000071D70000-0x0000000071DBC000-memory.dmp
          Filesize

          304KB

        • memory/564-168-0x0000000006F50000-0x0000000006F6E000-memory.dmp
          Filesize

          120KB

        • memory/564-170-0x0000000008320000-0x000000000899A000-memory.dmp
          Filesize

          6.5MB

        • memory/1180-174-0x0000000000000000-mapping.dmp
        • memory/1180-176-0x00000000008A0000-0x00000000008A1000-memory.dmp
          Filesize

          4KB

        • memory/1368-131-0x0000000005630000-0x0000000005BD4000-memory.dmp
          Filesize

          5.6MB

        • memory/1368-133-0x0000000004FF0000-0x0000000004FFA000-memory.dmp
          Filesize

          40KB

        • memory/1368-132-0x0000000005080000-0x0000000005112000-memory.dmp
          Filesize

          584KB

        • memory/1368-130-0x0000000000550000-0x000000000064A000-memory.dmp
          Filesize

          1000KB

        • memory/1368-135-0x0000000000FE0000-0x0000000001046000-memory.dmp
          Filesize

          408KB

        • memory/1368-134-0x00000000077F0000-0x000000000788C000-memory.dmp
          Filesize

          624KB

        • memory/1468-178-0x00000000078B0000-0x00000000078BE000-memory.dmp
          Filesize

          56KB

        • memory/1468-171-0x0000000007680000-0x000000000769A000-memory.dmp
          Filesize

          104KB

        • memory/1468-163-0x0000000000000000-mapping.dmp
        • memory/1468-175-0x0000000007950000-0x00000000079E6000-memory.dmp
          Filesize

          600KB

        • memory/1468-169-0x0000000071D70000-0x0000000071DBC000-memory.dmp
          Filesize

          304KB

        • memory/1468-172-0x00000000076E0000-0x00000000076EA000-memory.dmp
          Filesize

          40KB

        • memory/1688-158-0x0000000000000000-mapping.dmp
        • memory/2192-183-0x0000000000000000-mapping.dmp
        • memory/2228-143-0x0000000000000000-mapping.dmp
        • memory/2228-150-0x00000000006E0000-0x0000000000706000-memory.dmp
          Filesize

          152KB

        • memory/2752-159-0x0000000000000000-mapping.dmp
        • memory/3152-144-0x0000000000010000-0x000000000001A000-memory.dmp
          Filesize

          40KB

        • memory/3152-140-0x0000000000000000-mapping.dmp
        • memory/3920-137-0x0000000000000000-mapping.dmp
        • memory/3920-138-0x0000000000400000-0x000000000046C000-memory.dmp
          Filesize

          432KB

        • memory/4108-136-0x0000000000000000-mapping.dmp
        • memory/4148-147-0x0000000000000000-mapping.dmp
        • memory/4764-156-0x0000000005BA0000-0x0000000005BBE000-memory.dmp
          Filesize

          120KB

        • memory/4764-152-0x0000000002290000-0x00000000022C6000-memory.dmp
          Filesize

          216KB

        • memory/4764-153-0x0000000004DC0000-0x00000000053E8000-memory.dmp
          Filesize

          6.2MB

        • memory/4764-154-0x0000000004CF0000-0x0000000004D12000-memory.dmp
          Filesize

          136KB

        • memory/4764-155-0x00000000054E0000-0x0000000005546000-memory.dmp
          Filesize

          408KB

        • memory/4764-151-0x0000000000000000-mapping.dmp
        • memory/4784-186-0x0000000000000000-mapping.dmp
        • memory/5052-162-0x0000000000000000-mapping.dmp
        • memory/5104-188-0x0000000000000000-mapping.dmp
        • memory/5104-190-0x0000000071D70000-0x0000000071DBC000-memory.dmp
          Filesize

          304KB