Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 10:34
Behavioral task
behavioral1
Sample
f42c9599126a2145a8337859062564cb.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
f42c9599126a2145a8337859062564cb.exe
Resource
win10v2004-20220718-en
General
-
Target
f42c9599126a2145a8337859062564cb.exe
-
Size
1.3MB
-
MD5
f42c9599126a2145a8337859062564cb
-
SHA1
0c3d5afe4e3e875292073f5c7780bf015688b7ca
-
SHA256
7149f99900a42e8b22a22392523faf51cd0fe268c3f7e983463232e7945f7aa5
-
SHA512
f96c92545a1529d6fbeed5cd60fd3f079acabc8f0201e0a4282acd2ea6201fb7405ac4cc1c6ca021fe1275db70a0069825f3ecfcfb117f9fd2b1c4648b8b1388
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 13 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe netwire C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1472-134-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/1472-142-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/3796-172-0x0000000000AB0000-0x0000000000ACD000-memory.dmp warzonerat behavioral2/memory/3796-181-0x0000000000AB0000-0x0000000000ACD000-memory.dmp warzonerat -
Executes dropped EXE 9 IoCs
Processes:
Blasthost.exeHost.exeRtDCpl64.exeBlasthost.exeRtDCpl64.exeRtDCpl64.exeBlasthost.exeRtDCpl64.exeRtDCpl64.exepid process 1936 Blasthost.exe 4448 Host.exe 4216 RtDCpl64.exe 5084 Blasthost.exe 4688 RtDCpl64.exe 208 RtDCpl64.exe 1320 Blasthost.exe 3796 RtDCpl64.exe 3312 RtDCpl64.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f42c9599126a2145a8337859062564cb.exeRtDCpl64.exeRtDCpl64.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\Control Panel\International\Geo\Nation f42c9599126a2145a8337859062564cb.exe Key value queried \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\Control Panel\International\Geo\Nation RtDCpl64.exe Key value queried \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\Control Panel\International\Geo\Nation RtDCpl64.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
f42c9599126a2145a8337859062564cb.exeRtDCpl64.exeRtDCpl64.exedescription pid process target process PID 3448 set thread context of 1472 3448 f42c9599126a2145a8337859062564cb.exe f42c9599126a2145a8337859062564cb.exe PID 4216 set thread context of 4688 4216 RtDCpl64.exe RtDCpl64.exe PID 208 set thread context of 3796 208 RtDCpl64.exe RtDCpl64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2516 schtasks.exe 4560 schtasks.exe 4504 schtasks.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
f42c9599126a2145a8337859062564cb.exeBlasthost.exef42c9599126a2145a8337859062564cb.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exedescription pid process target process PID 3448 wrote to memory of 1936 3448 f42c9599126a2145a8337859062564cb.exe Blasthost.exe PID 3448 wrote to memory of 1936 3448 f42c9599126a2145a8337859062564cb.exe Blasthost.exe PID 3448 wrote to memory of 1936 3448 f42c9599126a2145a8337859062564cb.exe Blasthost.exe PID 3448 wrote to memory of 1472 3448 f42c9599126a2145a8337859062564cb.exe f42c9599126a2145a8337859062564cb.exe PID 3448 wrote to memory of 1472 3448 f42c9599126a2145a8337859062564cb.exe f42c9599126a2145a8337859062564cb.exe PID 3448 wrote to memory of 1472 3448 f42c9599126a2145a8337859062564cb.exe f42c9599126a2145a8337859062564cb.exe PID 3448 wrote to memory of 1472 3448 f42c9599126a2145a8337859062564cb.exe f42c9599126a2145a8337859062564cb.exe PID 3448 wrote to memory of 1472 3448 f42c9599126a2145a8337859062564cb.exe f42c9599126a2145a8337859062564cb.exe PID 1936 wrote to memory of 4448 1936 Blasthost.exe Host.exe PID 1936 wrote to memory of 4448 1936 Blasthost.exe Host.exe PID 1936 wrote to memory of 4448 1936 Blasthost.exe Host.exe PID 3448 wrote to memory of 2516 3448 f42c9599126a2145a8337859062564cb.exe schtasks.exe PID 3448 wrote to memory of 2516 3448 f42c9599126a2145a8337859062564cb.exe schtasks.exe PID 3448 wrote to memory of 2516 3448 f42c9599126a2145a8337859062564cb.exe schtasks.exe PID 1472 wrote to memory of 2796 1472 f42c9599126a2145a8337859062564cb.exe cmd.exe PID 1472 wrote to memory of 2796 1472 f42c9599126a2145a8337859062564cb.exe cmd.exe PID 1472 wrote to memory of 2796 1472 f42c9599126a2145a8337859062564cb.exe cmd.exe PID 1472 wrote to memory of 2796 1472 f42c9599126a2145a8337859062564cb.exe cmd.exe PID 1472 wrote to memory of 2796 1472 f42c9599126a2145a8337859062564cb.exe cmd.exe PID 4216 wrote to memory of 5084 4216 RtDCpl64.exe Blasthost.exe PID 4216 wrote to memory of 5084 4216 RtDCpl64.exe Blasthost.exe PID 4216 wrote to memory of 5084 4216 RtDCpl64.exe Blasthost.exe PID 4216 wrote to memory of 4688 4216 RtDCpl64.exe RtDCpl64.exe PID 4216 wrote to memory of 4688 4216 RtDCpl64.exe RtDCpl64.exe PID 4216 wrote to memory of 4688 4216 RtDCpl64.exe RtDCpl64.exe PID 4216 wrote to memory of 4688 4216 RtDCpl64.exe RtDCpl64.exe PID 4216 wrote to memory of 4688 4216 RtDCpl64.exe RtDCpl64.exe PID 4688 wrote to memory of 1424 4688 RtDCpl64.exe cmd.exe PID 4688 wrote to memory of 1424 4688 RtDCpl64.exe cmd.exe PID 4688 wrote to memory of 1424 4688 RtDCpl64.exe cmd.exe PID 4216 wrote to memory of 4560 4216 RtDCpl64.exe schtasks.exe PID 4216 wrote to memory of 4560 4216 RtDCpl64.exe schtasks.exe PID 4216 wrote to memory of 4560 4216 RtDCpl64.exe schtasks.exe PID 4688 wrote to memory of 1424 4688 RtDCpl64.exe cmd.exe PID 4688 wrote to memory of 1424 4688 RtDCpl64.exe cmd.exe PID 208 wrote to memory of 1320 208 RtDCpl64.exe Blasthost.exe PID 208 wrote to memory of 1320 208 RtDCpl64.exe Blasthost.exe PID 208 wrote to memory of 1320 208 RtDCpl64.exe Blasthost.exe PID 208 wrote to memory of 3796 208 RtDCpl64.exe RtDCpl64.exe PID 208 wrote to memory of 3796 208 RtDCpl64.exe RtDCpl64.exe PID 208 wrote to memory of 3796 208 RtDCpl64.exe RtDCpl64.exe PID 208 wrote to memory of 3796 208 RtDCpl64.exe RtDCpl64.exe PID 208 wrote to memory of 3796 208 RtDCpl64.exe RtDCpl64.exe PID 3796 wrote to memory of 4200 3796 RtDCpl64.exe cmd.exe PID 3796 wrote to memory of 4200 3796 RtDCpl64.exe cmd.exe PID 3796 wrote to memory of 4200 3796 RtDCpl64.exe cmd.exe PID 208 wrote to memory of 4504 208 RtDCpl64.exe schtasks.exe PID 208 wrote to memory of 4504 208 RtDCpl64.exe schtasks.exe PID 208 wrote to memory of 4504 208 RtDCpl64.exe schtasks.exe PID 3796 wrote to memory of 4200 3796 RtDCpl64.exe cmd.exe PID 3796 wrote to memory of 4200 3796 RtDCpl64.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f42c9599126a2145a8337859062564cb.exe"C:\Users\Admin\AppData\Local\Temp\f42c9599126a2145a8337859062564cb.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\f42c9599126a2145a8337859062564cb.exe"C:\Users\Admin\AppData\Local\Temp\f42c9599126a2145a8337859062564cb.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2796
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2516
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1424
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4560
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:1320 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:4200
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4504
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Executes dropped EXE
PID:3312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
1.3MB
MD502811b150cd4176507bf3784e37b0375
SHA1af997cbf63892e52f232c2b8dc4511f0913a60fb
SHA2567caecb21bae3af5099e6e31e9604babcefb8759eac1bb8c6ee73062474f35ae0
SHA512762a7b481960719f9e5e19484f2679e549deb27fbef45092f3c380a0c2c6f11098eb1de8a9a571ccba63c86818ab74a539c9399f517f1e3f911892c874947528
-
Filesize
1.3MB
MD502811b150cd4176507bf3784e37b0375
SHA1af997cbf63892e52f232c2b8dc4511f0913a60fb
SHA2567caecb21bae3af5099e6e31e9604babcefb8759eac1bb8c6ee73062474f35ae0
SHA512762a7b481960719f9e5e19484f2679e549deb27fbef45092f3c380a0c2c6f11098eb1de8a9a571ccba63c86818ab74a539c9399f517f1e3f911892c874947528
-
Filesize
1.3MB
MD502811b150cd4176507bf3784e37b0375
SHA1af997cbf63892e52f232c2b8dc4511f0913a60fb
SHA2567caecb21bae3af5099e6e31e9604babcefb8759eac1bb8c6ee73062474f35ae0
SHA512762a7b481960719f9e5e19484f2679e549deb27fbef45092f3c380a0c2c6f11098eb1de8a9a571ccba63c86818ab74a539c9399f517f1e3f911892c874947528
-
Filesize
1.3MB
MD502811b150cd4176507bf3784e37b0375
SHA1af997cbf63892e52f232c2b8dc4511f0913a60fb
SHA2567caecb21bae3af5099e6e31e9604babcefb8759eac1bb8c6ee73062474f35ae0
SHA512762a7b481960719f9e5e19484f2679e549deb27fbef45092f3c380a0c2c6f11098eb1de8a9a571ccba63c86818ab74a539c9399f517f1e3f911892c874947528
-
Filesize
1.3MB
MD502811b150cd4176507bf3784e37b0375
SHA1af997cbf63892e52f232c2b8dc4511f0913a60fb
SHA2567caecb21bae3af5099e6e31e9604babcefb8759eac1bb8c6ee73062474f35ae0
SHA512762a7b481960719f9e5e19484f2679e549deb27fbef45092f3c380a0c2c6f11098eb1de8a9a571ccba63c86818ab74a539c9399f517f1e3f911892c874947528
-
Filesize
1.3MB
MD502811b150cd4176507bf3784e37b0375
SHA1af997cbf63892e52f232c2b8dc4511f0913a60fb
SHA2567caecb21bae3af5099e6e31e9604babcefb8759eac1bb8c6ee73062474f35ae0
SHA512762a7b481960719f9e5e19484f2679e549deb27fbef45092f3c380a0c2c6f11098eb1de8a9a571ccba63c86818ab74a539c9399f517f1e3f911892c874947528