Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2022 16:41
Behavioral task
behavioral1
Sample
virussign.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
virussign.exe
Resource
win10v2004-20220414-en
General
-
Target
virussign.exe
-
Size
1.3MB
-
MD5
60b5c421004716c14a35409cc5acfaa0
-
SHA1
ac30ce5aa690a19dd3637156582a6ecd5e257e10
-
SHA256
b0183d2016f99466eb45c654e9dc8e53bd4b90df2512acf3c526bdf65b372ba5
-
SHA512
4502ae4d1c54642465141e29424162d49b4c616566111a1a2fac9c90f4a739c09e776d2ce4668d3b54e7ab8acb076ea7cdce2a8ce1ab987ee07edf55639de60d
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 12 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe netwire C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2228-145-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2228-137-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2324-172-0x00000000003D0000-0x00000000003ED000-memory.dmp warzonerat behavioral2/memory/2324-181-0x00000000003D0000-0x00000000003ED000-memory.dmp warzonerat -
Executes dropped EXE 8 IoCs
Processes:
Blasthost.exeHost.exeRtDCpl64.exeBlasthost.exeRtDCpl64.exeRtDCpl64.exeBlasthost.exeRtDCpl64.exepid process 1944 Blasthost.exe 3856 Host.exe 1968 RtDCpl64.exe 5040 Blasthost.exe 2000 RtDCpl64.exe 3412 RtDCpl64.exe 3976 Blasthost.exe 2324 RtDCpl64.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
virussign.exeRtDCpl64.exeRtDCpl64.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation virussign.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation RtDCpl64.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation RtDCpl64.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
virussign.exeRtDCpl64.exeRtDCpl64.exedescription pid process target process PID 3420 set thread context of 2228 3420 virussign.exe virussign.exe PID 1968 set thread context of 2000 1968 RtDCpl64.exe RtDCpl64.exe PID 3412 set thread context of 2324 3412 RtDCpl64.exe RtDCpl64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2768 schtasks.exe 1552 schtasks.exe 1048 schtasks.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
virussign.exeBlasthost.exevirussign.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exedescription pid process target process PID 3420 wrote to memory of 1944 3420 virussign.exe Blasthost.exe PID 3420 wrote to memory of 1944 3420 virussign.exe Blasthost.exe PID 3420 wrote to memory of 1944 3420 virussign.exe Blasthost.exe PID 1944 wrote to memory of 3856 1944 Blasthost.exe Host.exe PID 1944 wrote to memory of 3856 1944 Blasthost.exe Host.exe PID 1944 wrote to memory of 3856 1944 Blasthost.exe Host.exe PID 3420 wrote to memory of 2228 3420 virussign.exe virussign.exe PID 3420 wrote to memory of 2228 3420 virussign.exe virussign.exe PID 3420 wrote to memory of 2228 3420 virussign.exe virussign.exe PID 3420 wrote to memory of 2228 3420 virussign.exe virussign.exe PID 3420 wrote to memory of 2228 3420 virussign.exe virussign.exe PID 2228 wrote to memory of 3740 2228 virussign.exe cmd.exe PID 2228 wrote to memory of 3740 2228 virussign.exe cmd.exe PID 2228 wrote to memory of 3740 2228 virussign.exe cmd.exe PID 3420 wrote to memory of 2768 3420 virussign.exe schtasks.exe PID 3420 wrote to memory of 2768 3420 virussign.exe schtasks.exe PID 3420 wrote to memory of 2768 3420 virussign.exe schtasks.exe PID 2228 wrote to memory of 3740 2228 virussign.exe cmd.exe PID 2228 wrote to memory of 3740 2228 virussign.exe cmd.exe PID 1968 wrote to memory of 5040 1968 RtDCpl64.exe Blasthost.exe PID 1968 wrote to memory of 5040 1968 RtDCpl64.exe Blasthost.exe PID 1968 wrote to memory of 5040 1968 RtDCpl64.exe Blasthost.exe PID 1968 wrote to memory of 2000 1968 RtDCpl64.exe RtDCpl64.exe PID 1968 wrote to memory of 2000 1968 RtDCpl64.exe RtDCpl64.exe PID 1968 wrote to memory of 2000 1968 RtDCpl64.exe RtDCpl64.exe PID 1968 wrote to memory of 2000 1968 RtDCpl64.exe RtDCpl64.exe PID 1968 wrote to memory of 2000 1968 RtDCpl64.exe RtDCpl64.exe PID 2000 wrote to memory of 3588 2000 RtDCpl64.exe cmd.exe PID 2000 wrote to memory of 3588 2000 RtDCpl64.exe cmd.exe PID 2000 wrote to memory of 3588 2000 RtDCpl64.exe cmd.exe PID 1968 wrote to memory of 1552 1968 RtDCpl64.exe schtasks.exe PID 1968 wrote to memory of 1552 1968 RtDCpl64.exe schtasks.exe PID 1968 wrote to memory of 1552 1968 RtDCpl64.exe schtasks.exe PID 2000 wrote to memory of 3588 2000 RtDCpl64.exe cmd.exe PID 2000 wrote to memory of 3588 2000 RtDCpl64.exe cmd.exe PID 3412 wrote to memory of 3976 3412 RtDCpl64.exe Blasthost.exe PID 3412 wrote to memory of 3976 3412 RtDCpl64.exe Blasthost.exe PID 3412 wrote to memory of 3976 3412 RtDCpl64.exe Blasthost.exe PID 3412 wrote to memory of 2324 3412 RtDCpl64.exe RtDCpl64.exe PID 3412 wrote to memory of 2324 3412 RtDCpl64.exe RtDCpl64.exe PID 3412 wrote to memory of 2324 3412 RtDCpl64.exe RtDCpl64.exe PID 3412 wrote to memory of 2324 3412 RtDCpl64.exe RtDCpl64.exe PID 3412 wrote to memory of 2324 3412 RtDCpl64.exe RtDCpl64.exe PID 2324 wrote to memory of 2052 2324 RtDCpl64.exe cmd.exe PID 2324 wrote to memory of 2052 2324 RtDCpl64.exe cmd.exe PID 2324 wrote to memory of 2052 2324 RtDCpl64.exe cmd.exe PID 3412 wrote to memory of 1048 3412 RtDCpl64.exe schtasks.exe PID 3412 wrote to memory of 1048 3412 RtDCpl64.exe schtasks.exe PID 3412 wrote to memory of 1048 3412 RtDCpl64.exe schtasks.exe PID 2324 wrote to memory of 2052 2324 RtDCpl64.exe cmd.exe PID 2324 wrote to memory of 2052 2324 RtDCpl64.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.exe"C:\Users\Admin\AppData\Local\Temp\virussign.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:3856 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\virussign.exe"C:\Users\Admin\AppData\Local\Temp\virussign.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2228
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:3740
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:3588
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:1552
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2052
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:1048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
1.3MB
MD5b93a448017dc382b5b99d982e79d33f2
SHA116d1a302bb3147d5fb98f233867cb56fbe9d1702
SHA256aacced5e7cd7bf7301729cc70125f9076d6223be6f513485d8662962d2c3267c
SHA5120146511e2f484403fc4e4de7469bc3a5f928bc2e06655db575c70f75f0bd65865b46633e578e5e12b3e29d36af0acef5d3a6b56d739a5a45ddac31bd1246ba65
-
Filesize
1.3MB
MD5b93a448017dc382b5b99d982e79d33f2
SHA116d1a302bb3147d5fb98f233867cb56fbe9d1702
SHA256aacced5e7cd7bf7301729cc70125f9076d6223be6f513485d8662962d2c3267c
SHA5120146511e2f484403fc4e4de7469bc3a5f928bc2e06655db575c70f75f0bd65865b46633e578e5e12b3e29d36af0acef5d3a6b56d739a5a45ddac31bd1246ba65
-
Filesize
1.3MB
MD5b93a448017dc382b5b99d982e79d33f2
SHA116d1a302bb3147d5fb98f233867cb56fbe9d1702
SHA256aacced5e7cd7bf7301729cc70125f9076d6223be6f513485d8662962d2c3267c
SHA5120146511e2f484403fc4e4de7469bc3a5f928bc2e06655db575c70f75f0bd65865b46633e578e5e12b3e29d36af0acef5d3a6b56d739a5a45ddac31bd1246ba65
-
Filesize
1.3MB
MD5b93a448017dc382b5b99d982e79d33f2
SHA116d1a302bb3147d5fb98f233867cb56fbe9d1702
SHA256aacced5e7cd7bf7301729cc70125f9076d6223be6f513485d8662962d2c3267c
SHA5120146511e2f484403fc4e4de7469bc3a5f928bc2e06655db575c70f75f0bd65865b46633e578e5e12b3e29d36af0acef5d3a6b56d739a5a45ddac31bd1246ba65
-
Filesize
1.3MB
MD5b93a448017dc382b5b99d982e79d33f2
SHA116d1a302bb3147d5fb98f233867cb56fbe9d1702
SHA256aacced5e7cd7bf7301729cc70125f9076d6223be6f513485d8662962d2c3267c
SHA5120146511e2f484403fc4e4de7469bc3a5f928bc2e06655db575c70f75f0bd65865b46633e578e5e12b3e29d36af0acef5d3a6b56d739a5a45ddac31bd1246ba65