Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2022 14:52

General

  • Target

    4e4d51350f186355c0bade0a4093847b.exe

  • Size

    5.0MB

  • MD5

    4e4d51350f186355c0bade0a4093847b

  • SHA1

    6b0bb9f756eb18699f354aed4d8ecdccddf26c71

  • SHA256

    b244154eb02dde8424ac1dfc45cf8b1351de4c80c35ccbc338be7425c0a382d7

  • SHA512

    76b306573ca767339730d675670d8259ca02a823dfd27b1833e2fc8a4b4d9e32cbf72943f6dbec13dc83a6f173dde1ab317bcf34f50c57f1826c38a4567608ad

  • SSDEEP

    98304:BdGzxEoKDl5ZLICyK5CW+AHYmK8/t1UjgX98k1Lh8Tyd1:BdGJC59yICNiYmrv98k11nd1

Malware Config

Extracted

Family

warzonerat

C2

sheet.duckdns.org:4110

Extracted

Family

bitrat

Version

1.38

C2

sheet.duckdns.org:8471

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • install_dir

    Install path

  • install_file

    Install name

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e4d51350f186355c0bade0a4093847b.exe
    "C:\Users\Admin\AppData\Local\Temp\4e4d51350f186355c0bade0a4093847b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:240
    • C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe
      "C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\SysWOW64\WSCript.exe
        WSCript C:\Users\Admin\AppData\Local\Temp\CUVZTV.vbs
        3⤵
          PID:1376
      • C:\Users\Admin\AppData\Local\Temp\explorer.exe
        "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1428
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Add-MpPreference -ExclusionPath C:\
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1616
        • C:\Users\Admin\Documents\explorer.exe
          "C:\Users\Admin\Documents\explorer.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:332
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell Add-MpPreference -ExclusionPath C:\
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1648
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe"
            4⤵
              PID:1196
        • C:\Users\Admin\AppData\Local\Temp\updater.exe
          "C:\Users\Admin\AppData\Local\Temp\updater.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1324
        • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
          2⤵
          • Enumerates system info in registry
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:1792

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\CUVZTV.vbs

        Filesize

        832B

        MD5

        7b88dc87f846cb86651815d1f650ddc5

        SHA1

        a9556677d0d28d3fe13468f55b3c1352eaf0cb87

        SHA256

        f2ac23ed9e1bd7a05bc3a41aa53637e49fb22185619dcb038479c453ac369e1f

        SHA512

        e400d521a0025973f98137ecceede2780b0b199cc98ba9dc08291641615df3b6ce4f0a9ce4bfacf82649cbc7ccd6f8aee9816c4588924f15f6de8858cb78bb6e

      • C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe

        Filesize

        1.1MB

        MD5

        f0f663b62326867adc306451762414b2

        SHA1

        0dd272467164856dacbdca66f5eea4b7a6100a76

        SHA256

        2f850169f3bd43936dfc32e0cf0bfbab58ce9dd70e598d151ecfe0ef09a3e499

        SHA512

        90f18b1a93bbbbf4b75466b6f484c811440311833fa574176ae9e6eee535aaf36c46ec420872752aba906cc271c5fa06f26f2b5fd09e33951e1ef969dc882fea

      • C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe

        Filesize

        1.1MB

        MD5

        f0f663b62326867adc306451762414b2

        SHA1

        0dd272467164856dacbdca66f5eea4b7a6100a76

        SHA256

        2f850169f3bd43936dfc32e0cf0bfbab58ce9dd70e598d151ecfe0ef09a3e499

        SHA512

        90f18b1a93bbbbf4b75466b6f484c811440311833fa574176ae9e6eee535aaf36c46ec420872752aba906cc271c5fa06f26f2b5fd09e33951e1ef969dc882fea

      • C:\Users\Admin\AppData\Local\Temp\budget.xlsx

        Filesize

        20KB

        MD5

        f73ebdb3d2562351e70c5476172ff4c4

        SHA1

        49bf5e4428855a9b9f311e7127fd4ce0d5f89eb3

        SHA256

        4454f6250448bb08bbde2c54ac7308323bd60814461009cedba512781bc4d226

        SHA512

        3b3223841b40aa623edd68aed7e572c9703f55a10731f9077435e262813db3de2947880632f60f590d02a8f7248df30b93a8d1f9fef89b125031749c8c5ef5db

      • C:\Users\Admin\AppData\Local\Temp\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • C:\Users\Admin\AppData\Local\Temp\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • C:\Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • C:\Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        46583f420b84c45a26eb5a7bbc13d59e

        SHA1

        85d74d2b1b5fdbedd1d83b1c6fa818107b70867a

        SHA256

        ba403ee8ceeb247fd35540de461ed1b6998148b31753c499bc868324be18cf36

        SHA512

        68377b8ddd6992ce250812673b753898626a37d53dae2e51ecb6621ed25699f3a7625312aee461be08009b767934918d2de3fae699e1f4f9d752a4da4af9b092

      • C:\Users\Admin\Documents\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • C:\Users\Admin\Documents\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • \Users\Admin\AppData\Local\Temp\XRCCYX.exe

        Filesize

        1.1MB

        MD5

        f0f663b62326867adc306451762414b2

        SHA1

        0dd272467164856dacbdca66f5eea4b7a6100a76

        SHA256

        2f850169f3bd43936dfc32e0cf0bfbab58ce9dd70e598d151ecfe0ef09a3e499

        SHA512

        90f18b1a93bbbbf4b75466b6f484c811440311833fa574176ae9e6eee535aaf36c46ec420872752aba906cc271c5fa06f26f2b5fd09e33951e1ef969dc882fea

      • \Users\Admin\AppData\Local\Temp\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • \Users\Admin\AppData\Local\Temp\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • \Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • \Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • \Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • \Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • \Users\Admin\Documents\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • \Users\Admin\Documents\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • memory/240-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

        Filesize

        8KB

      • memory/332-96-0x0000000000000000-mapping.dmp

      • memory/1196-107-0x0000000000000000-mapping.dmp

      • memory/1196-108-0x00000000001A0000-0x00000000001A1000-memory.dmp

        Filesize

        4KB

      • memory/1324-87-0x00000000007D0000-0x00000000007DA000-memory.dmp

        Filesize

        40KB

      • memory/1324-66-0x0000000000000000-mapping.dmp

      • memory/1324-80-0x00000000007D0000-0x00000000007DA000-memory.dmp

        Filesize

        40KB

      • memory/1324-88-0x00000000007D0000-0x00000000007DA000-memory.dmp

        Filesize

        40KB

      • memory/1324-79-0x00000000007D0000-0x00000000007DA000-memory.dmp

        Filesize

        40KB

      • memory/1324-68-0x0000000000400000-0x00000000007CE000-memory.dmp

        Filesize

        3.8MB

      • memory/1376-81-0x0000000000000000-mapping.dmp

      • memory/1428-60-0x0000000000000000-mapping.dmp

      • memory/1616-93-0x000000006AF70000-0x000000006B51B000-memory.dmp

        Filesize

        5.7MB

      • memory/1616-92-0x000000006AF70000-0x000000006B51B000-memory.dmp

        Filesize

        5.7MB

      • memory/1616-90-0x0000000000000000-mapping.dmp

      • memory/1648-106-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/1648-105-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/1648-102-0x0000000000000000-mapping.dmp

      • memory/1792-100-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1792-76-0x0000000070F61000-0x0000000070F63000-memory.dmp

        Filesize

        8KB

      • memory/1792-101-0x0000000071F4D000-0x0000000071F58000-memory.dmp

        Filesize

        44KB

      • memory/1792-77-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1792-75-0x000000002F181000-0x000000002F184000-memory.dmp

        Filesize

        12KB

      • memory/1792-78-0x0000000071F4D000-0x0000000071F58000-memory.dmp

        Filesize

        44KB

      • memory/1792-86-0x0000000071F4D000-0x0000000071F58000-memory.dmp

        Filesize

        44KB

      • memory/1792-74-0x0000000000000000-mapping.dmp

      • memory/1928-56-0x0000000000000000-mapping.dmp