Analysis
-
max time kernel
130s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
22/07/2022, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe
Resource
win10v2004-20220721-en
General
-
Target
1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe
-
Size
1.4MB
-
MD5
c5cb27cb09bdc222aeffaf0cccb96bad
-
SHA1
d3d9681b8ee4730dca84d8cde608f12348bfe8e8
-
SHA256
1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361
-
SHA512
a05bc118eff3c215debbd9909dd3d34cb3d0f2adcb47ea29e626416275e7793096d6e8ba8448ebfff4fff93cb6b142d2fcae414a403de57ddce9029b019d6f8a
Malware Config
Extracted
warzonerat
45.162.228.171:26112
Signatures
-
Detect PureCrypter loader 1 IoCs
resource yara_rule behavioral1/memory/1996-58-0x0000000001270000-0x00000000012CC000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a loader which is intended for downloading and executing additional payloads.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aehhvhxfn = "\"C:\\Users\\Admin\\AppData\\Roaming\\Msfhxqaxh\\Aehhvhxfn.exe\"" 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1996 set thread context of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
pid Process 1132 timeout.exe 1988 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1996 wrote to memory of 992 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 27 PID 1996 wrote to memory of 992 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 27 PID 1996 wrote to memory of 992 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 27 PID 1996 wrote to memory of 992 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 27 PID 992 wrote to memory of 1132 992 cmd.exe 29 PID 992 wrote to memory of 1132 992 cmd.exe 29 PID 992 wrote to memory of 1132 992 cmd.exe 29 PID 992 wrote to memory of 1132 992 cmd.exe 29 PID 1996 wrote to memory of 1216 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 30 PID 1996 wrote to memory of 1216 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 30 PID 1996 wrote to memory of 1216 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 30 PID 1996 wrote to memory of 1216 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 30 PID 1216 wrote to memory of 1988 1216 cmd.exe 32 PID 1216 wrote to memory of 1988 1216 cmd.exe 32 PID 1216 wrote to memory of 1988 1216 cmd.exe 32 PID 1216 wrote to memory of 1988 1216 cmd.exe 32 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33 PID 1996 wrote to memory of 1400 1996 1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe"C:\Users\Admin\AppData\Local\Temp\1851a8dd1eb684515d31bb1b3a2f162eab634af839c9ef1002a8fc40bed8e361.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /nobreak /t 202⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 203⤵
- Delays execution with timeout.exe
PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 452⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\timeout.exetimeout 453⤵
- Delays execution with timeout.exe
PID:1988
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵PID:1400
-