Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2022 11:46
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220722-en
General
-
Target
tmp.exe
-
Size
153KB
-
MD5
74cf39132e2b3d825a2f6c0b9cd4ba90
-
SHA1
df674c8c6156698be10c0285fb3bc56a2daab533
-
SHA256
b32a1e21f9941f2e70fac915af9cea3add6f859b8ccca73cc5aadf369af3ae1c
-
SHA512
a6794a1b3ee3a374724a25a092f855460c9fc5cba002f7b414152ca8314ecaf1ee97b1e79d2c69cf768a589367a1af22ae49cf882a24558c3bde9e7b37de8d06
Malware Config
Extracted
warzonerat
dropy1.ddns.net:5200
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" tmp.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe warzonerat C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe warzonerat C:\ProgramData\images.exe warzonerat C:\ProgramData\images.exe warzonerat -
Executes dropped EXE 2 IoCs
Processes:
tmp.exeimages.exepid process 4880 tmp.exe 4968 images.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" tmp.exe -
Drops file in Program Files directory 64 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13165~1.21\MICROS~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~1.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe tmp.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe tmp.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE tmp.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe tmp.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI391D~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~2.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~4.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MIA062~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE tmp.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE tmp.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe tmp.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~3.EXE tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI9C33~1.EXE tmp.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe tmp.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE tmp.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe tmp.exe -
Drops file in Windows directory 1 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\Windows\svchost.com tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
tmp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" tmp.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
tmp.exetmp.exeimages.exedescription pid process target process PID 3892 wrote to memory of 4880 3892 tmp.exe tmp.exe PID 3892 wrote to memory of 4880 3892 tmp.exe tmp.exe PID 3892 wrote to memory of 4880 3892 tmp.exe tmp.exe PID 4880 wrote to memory of 4968 4880 tmp.exe images.exe PID 4880 wrote to memory of 4968 4880 tmp.exe images.exe PID 4880 wrote to memory of 4968 4880 tmp.exe images.exe PID 4968 wrote to memory of 3948 4968 images.exe cmd.exe PID 4968 wrote to memory of 3948 4968 images.exe cmd.exe PID 4968 wrote to memory of 3948 4968 images.exe cmd.exe PID 4968 wrote to memory of 3948 4968 images.exe cmd.exe PID 4968 wrote to memory of 3948 4968 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Modifies system executable filetype association
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\tmp.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:3948
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5ee6e1f4747970b4a632a44bb94306252
SHA12d9742c91dfd01e5a30a3e2aa2e122614a12431a
SHA2564ae55af5ce1e246f3e044a5be932529618bb8d8d7738ad41ffcb999c54a927de
SHA512f31fc26856cfb6db0bece9536037fed0352d7520ecdff23b5f0b247d668d97e33749ef0e7f34ffd217b30249d88a307f821e540cb0fe6374cf48e01e30562106
-
Filesize
113KB
MD5ee6e1f4747970b4a632a44bb94306252
SHA12d9742c91dfd01e5a30a3e2aa2e122614a12431a
SHA2564ae55af5ce1e246f3e044a5be932529618bb8d8d7738ad41ffcb999c54a927de
SHA512f31fc26856cfb6db0bece9536037fed0352d7520ecdff23b5f0b247d668d97e33749ef0e7f34ffd217b30249d88a307f821e540cb0fe6374cf48e01e30562106
-
Filesize
113KB
MD5ee6e1f4747970b4a632a44bb94306252
SHA12d9742c91dfd01e5a30a3e2aa2e122614a12431a
SHA2564ae55af5ce1e246f3e044a5be932529618bb8d8d7738ad41ffcb999c54a927de
SHA512f31fc26856cfb6db0bece9536037fed0352d7520ecdff23b5f0b247d668d97e33749ef0e7f34ffd217b30249d88a307f821e540cb0fe6374cf48e01e30562106
-
Filesize
113KB
MD5ee6e1f4747970b4a632a44bb94306252
SHA12d9742c91dfd01e5a30a3e2aa2e122614a12431a
SHA2564ae55af5ce1e246f3e044a5be932529618bb8d8d7738ad41ffcb999c54a927de
SHA512f31fc26856cfb6db0bece9536037fed0352d7520ecdff23b5f0b247d668d97e33749ef0e7f34ffd217b30249d88a307f821e540cb0fe6374cf48e01e30562106