Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 21:19
Behavioral task
behavioral1
Sample
5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe
Resource
win10v2004-20220721-en
General
-
Target
5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe
-
Size
988KB
-
MD5
d03ba9e213edd46a343511e079637126
-
SHA1
5ce61b2a7b537ef63784084a1b0a26fd7d7fbd44
-
SHA256
5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f
-
SHA512
302c6e6bbb72241ac7e759be24b8c737ac41c90cb6af02f734aba98489dce8b571ef17d3b99b4e64ce3df435f585f5e14f4f781e11343ff2aa126d0d99312eaa
Malware Config
Extracted
warzonerat
43.226.229.43:2031
Signatures
-
NetWire RAT payload 17 IoCs
Processes:
resource yara_rule behavioral2/memory/4600-130-0x0000000000400000-0x00000000004FD000-memory.dmp netwire C:\Users\Admin\AppData\Local\Temp\Host.exe netwire C:\Users\Admin\AppData\Local\Temp\Host.exe netwire C:\Users\Admin\AppData\Roaming\windows\windows.exe netwire C:\Users\Admin\AppData\Roaming\windows\windows.exe netwire C:\Users\Admin\AppData\Roaming\Install\Host.exe netwire C:\Users\Admin\AppData\Roaming\Install\Host.exe netwire C:\Users\Admin\AppData\Roaming\windows\windows.exe netwire C:\Users\Admin\AppData\Roaming\windows\windows.exe netwire behavioral2/memory/4172-144-0x0000000000400000-0x00000000004FD000-memory.dmp netwire C:\ProgramData\images.exe netwire C:\ProgramData\images.exe netwire behavioral2/memory/1120-169-0x0000000000400000-0x00000000004FD000-memory.dmp netwire C:\Users\Admin\AppData\Roaming\windows\windows.exe netwire behavioral2/memory/260-172-0x0000000000400000-0x00000000004FD000-memory.dmp netwire C:\Users\Admin\AppData\Local\Temp\Host.exe netwire C:\Users\Admin\AppData\Roaming\windows\windows.exe netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3704-145-0x0000000002230000-0x000000000224D000-memory.dmp warzonerat behavioral2/memory/3704-151-0x0000000002230000-0x000000000224D000-memory.dmp warzonerat -
Executes dropped EXE 9 IoCs
Processes:
Host.exewindows.exeHost.exewindows.exewindows.exeimages.exewindows.exeHost.exewindows.exepid process 1424 Host.exe 4172 windows.exe 1032 Host.exe 3704 windows.exe 1120 windows.exe 260 images.exe 828 windows.exe 4444 Host.exe 3888 windows.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
images.exe5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exeHost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation images.exe Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation 5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation Host.exe -
Drops startup file 1 IoCs
Processes:
windows.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.vbs windows.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
Host.exewindows.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" windows.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
windows.exedescription pid process target process PID 4172 set thread context of 3704 4172 windows.exe windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 3 IoCs
Processes:
5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exewindows.exeimages.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\windows\windows.exe:ZoneIdentifier 5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe File created C:\ProgramData\images.exe\:ZoneIdentifier:$DATA windows.exe File opened for modification C:\Users\Admin\AppData\Roaming\windows\windows.exe:ZoneIdentifier images.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exewindows.exewindows.exepowershell.exewindows.exeimages.exepid process 4600 5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe 4600 5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe 4172 windows.exe 4172 windows.exe 3704 windows.exe 3704 windows.exe 3704 windows.exe 3704 windows.exe 4044 powershell.exe 4044 powershell.exe 1120 windows.exe 1120 windows.exe 1120 windows.exe 1120 windows.exe 260 images.exe 260 images.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
windows.exepid process 4172 windows.exe 4172 windows.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4044 powershell.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exeHost.exewindows.exewindows.exewindows.exeimages.exedescription pid process target process PID 4600 wrote to memory of 1424 4600 5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe Host.exe PID 4600 wrote to memory of 1424 4600 5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe Host.exe PID 4600 wrote to memory of 1424 4600 5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe Host.exe PID 4600 wrote to memory of 4172 4600 5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe windows.exe PID 4600 wrote to memory of 4172 4600 5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe windows.exe PID 4600 wrote to memory of 4172 4600 5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe windows.exe PID 1424 wrote to memory of 1032 1424 Host.exe Host.exe PID 1424 wrote to memory of 1032 1424 Host.exe Host.exe PID 1424 wrote to memory of 1032 1424 Host.exe Host.exe PID 4172 wrote to memory of 3704 4172 windows.exe windows.exe PID 4172 wrote to memory of 3704 4172 windows.exe windows.exe PID 4172 wrote to memory of 3704 4172 windows.exe windows.exe PID 4172 wrote to memory of 1120 4172 windows.exe windows.exe PID 4172 wrote to memory of 1120 4172 windows.exe windows.exe PID 4172 wrote to memory of 1120 4172 windows.exe windows.exe PID 3704 wrote to memory of 4044 3704 windows.exe powershell.exe PID 3704 wrote to memory of 4044 3704 windows.exe powershell.exe PID 3704 wrote to memory of 4044 3704 windows.exe powershell.exe PID 3704 wrote to memory of 260 3704 windows.exe images.exe PID 3704 wrote to memory of 260 3704 windows.exe images.exe PID 3704 wrote to memory of 260 3704 windows.exe images.exe PID 1120 wrote to memory of 828 1120 windows.exe windows.exe PID 1120 wrote to memory of 828 1120 windows.exe windows.exe PID 1120 wrote to memory of 828 1120 windows.exe windows.exe PID 260 wrote to memory of 4444 260 images.exe Host.exe PID 260 wrote to memory of 4444 260 images.exe Host.exe PID 260 wrote to memory of 4444 260 images.exe Host.exe PID 260 wrote to memory of 3888 260 images.exe windows.exe PID 260 wrote to memory of 3888 260 images.exe windows.exe PID 260 wrote to memory of 3888 260 images.exe windows.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe"C:\Users\Admin\AppData\Local\Temp\5db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f.exe"1⤵
- Checks computer location settings
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\Host.exe"C:\Users\Admin\AppData\Local\Temp\Host.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1032 -
C:\Users\Admin\AppData\Roaming\windows\windows.exe"C:\Users\Admin\AppData\Roaming\windows\windows.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Roaming\windows\windows.exe"C:\Users\Admin\AppData\Roaming\windows\windows.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Users\Admin\AppData\Local\Temp\Host.exe"C:\Users\Admin\AppData\Local\Temp\Host.exe"5⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Roaming\windows\windows.exe"C:\Users\Admin\AppData\Roaming\windows\windows.exe"5⤵
- Executes dropped EXE
PID:3888 -
C:\Users\Admin\AppData\Roaming\windows\windows.exe"C:\Users\Admin\AppData\Roaming\windows\windows.exe" 2 3704 2406599063⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Roaming\windows\windows.exe"C:\Users\Admin\AppData\Roaming\windows\windows.exe"4⤵
- Executes dropped EXE
PID:828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
988KB
MD5d03ba9e213edd46a343511e079637126
SHA15ce61b2a7b537ef63784084a1b0a26fd7d7fbd44
SHA2565db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f
SHA512302c6e6bbb72241ac7e759be24b8c737ac41c90cb6af02f734aba98489dce8b571ef17d3b99b4e64ce3df435f585f5e14f4f781e11343ff2aa126d0d99312eaa
-
Filesize
988KB
MD5d03ba9e213edd46a343511e079637126
SHA15ce61b2a7b537ef63784084a1b0a26fd7d7fbd44
SHA2565db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f
SHA512302c6e6bbb72241ac7e759be24b8c737ac41c90cb6af02f734aba98489dce8b571ef17d3b99b4e64ce3df435f585f5e14f4f781e11343ff2aa126d0d99312eaa
-
Filesize
127KB
MD5a0801a22c0b8384e64e8e86c7315d450
SHA1ac63c13511c952fdb432c2ef4994dde73f25e1a0
SHA256f7f39c5eb13af3a41222f44d27bada69a54392421a02cbe0fa69e462889c11f5
SHA512466732fbeb41f212ae4e7e67d86eb23824b262a1262cc86c015390cacc5f994e28e90037d62186d1ae192ed5cbd7cb090827014b078bafb46deb2a573ba27a37
-
Filesize
127KB
MD5a0801a22c0b8384e64e8e86c7315d450
SHA1ac63c13511c952fdb432c2ef4994dde73f25e1a0
SHA256f7f39c5eb13af3a41222f44d27bada69a54392421a02cbe0fa69e462889c11f5
SHA512466732fbeb41f212ae4e7e67d86eb23824b262a1262cc86c015390cacc5f994e28e90037d62186d1ae192ed5cbd7cb090827014b078bafb46deb2a573ba27a37
-
Filesize
127KB
MD5a0801a22c0b8384e64e8e86c7315d450
SHA1ac63c13511c952fdb432c2ef4994dde73f25e1a0
SHA256f7f39c5eb13af3a41222f44d27bada69a54392421a02cbe0fa69e462889c11f5
SHA512466732fbeb41f212ae4e7e67d86eb23824b262a1262cc86c015390cacc5f994e28e90037d62186d1ae192ed5cbd7cb090827014b078bafb46deb2a573ba27a37
-
Filesize
127KB
MD5a0801a22c0b8384e64e8e86c7315d450
SHA1ac63c13511c952fdb432c2ef4994dde73f25e1a0
SHA256f7f39c5eb13af3a41222f44d27bada69a54392421a02cbe0fa69e462889c11f5
SHA512466732fbeb41f212ae4e7e67d86eb23824b262a1262cc86c015390cacc5f994e28e90037d62186d1ae192ed5cbd7cb090827014b078bafb46deb2a573ba27a37
-
Filesize
127KB
MD5a0801a22c0b8384e64e8e86c7315d450
SHA1ac63c13511c952fdb432c2ef4994dde73f25e1a0
SHA256f7f39c5eb13af3a41222f44d27bada69a54392421a02cbe0fa69e462889c11f5
SHA512466732fbeb41f212ae4e7e67d86eb23824b262a1262cc86c015390cacc5f994e28e90037d62186d1ae192ed5cbd7cb090827014b078bafb46deb2a573ba27a37
-
Filesize
988KB
MD5d03ba9e213edd46a343511e079637126
SHA15ce61b2a7b537ef63784084a1b0a26fd7d7fbd44
SHA2565db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f
SHA512302c6e6bbb72241ac7e759be24b8c737ac41c90cb6af02f734aba98489dce8b571ef17d3b99b4e64ce3df435f585f5e14f4f781e11343ff2aa126d0d99312eaa
-
Filesize
988KB
MD5d03ba9e213edd46a343511e079637126
SHA15ce61b2a7b537ef63784084a1b0a26fd7d7fbd44
SHA2565db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f
SHA512302c6e6bbb72241ac7e759be24b8c737ac41c90cb6af02f734aba98489dce8b571ef17d3b99b4e64ce3df435f585f5e14f4f781e11343ff2aa126d0d99312eaa
-
Filesize
988KB
MD5d03ba9e213edd46a343511e079637126
SHA15ce61b2a7b537ef63784084a1b0a26fd7d7fbd44
SHA2565db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f
SHA512302c6e6bbb72241ac7e759be24b8c737ac41c90cb6af02f734aba98489dce8b571ef17d3b99b4e64ce3df435f585f5e14f4f781e11343ff2aa126d0d99312eaa
-
Filesize
988KB
MD5d03ba9e213edd46a343511e079637126
SHA15ce61b2a7b537ef63784084a1b0a26fd7d7fbd44
SHA2565db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f
SHA512302c6e6bbb72241ac7e759be24b8c737ac41c90cb6af02f734aba98489dce8b571ef17d3b99b4e64ce3df435f585f5e14f4f781e11343ff2aa126d0d99312eaa
-
Filesize
988KB
MD5d03ba9e213edd46a343511e079637126
SHA15ce61b2a7b537ef63784084a1b0a26fd7d7fbd44
SHA2565db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f
SHA512302c6e6bbb72241ac7e759be24b8c737ac41c90cb6af02f734aba98489dce8b571ef17d3b99b4e64ce3df435f585f5e14f4f781e11343ff2aa126d0d99312eaa
-
Filesize
988KB
MD5d03ba9e213edd46a343511e079637126
SHA15ce61b2a7b537ef63784084a1b0a26fd7d7fbd44
SHA2565db7976a06c896dce4c2749d697b9b265d2d4f40c739b600fdd8ffc02c208c4f
SHA512302c6e6bbb72241ac7e759be24b8c737ac41c90cb6af02f734aba98489dce8b571ef17d3b99b4e64ce3df435f585f5e14f4f781e11343ff2aa126d0d99312eaa