Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2022 04:45

General

  • Target

    37e5285ef075235abeed2a5bfbf0398cd49945e77842a8e45fba2e4dcf0c819e.exe

  • Size

    5.1MB

  • MD5

    208fc4b1d051034e07f3c79c813a68be

  • SHA1

    581c15ee8f6e0ed4d673c8e55331cf214fa38e6e

  • SHA256

    37e5285ef075235abeed2a5bfbf0398cd49945e77842a8e45fba2e4dcf0c819e

  • SHA512

    4fd853051a9a54dbbb539ce0a0614cb3520a582ee72f6edf99effc946e84f3d8c7d20a520f9c0dcf95c9548abf05bf424cea111e35bf28af3072a5f81b9c606a

  • SSDEEP

    98304:LcOQNJyg0rU78RzjYmO/B1fiVm3crNBxNEH8gmbUzWA6ZHnWwpZ:bQDygMNzjYfBxiVm3CNM8g4ZZH

Malware Config

Extracted

Family

warzonerat

C2

sheet.duckdns.org:4110

Extracted

Family

bitrat

Version

1.38

C2

sheet.duckdns.org:8471

Attributes
  • communication_password

    81dc9bdb52d04dc20036dbd8313ed055

  • install_dir

    Install path

  • install_file

    Install name

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 4 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37e5285ef075235abeed2a5bfbf0398cd49945e77842a8e45fba2e4dcf0c819e.exe
    "C:\Users\Admin\AppData\Local\Temp\37e5285ef075235abeed2a5bfbf0398cd49945e77842a8e45fba2e4dcf0c819e.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe
      "C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\SysWOW64\WSCript.exe
        WSCript C:\Users\Admin\AppData\Local\Temp\CUVZTV.vbs
        3⤵
          PID:2664
      • C:\Users\Admin\AppData\Local\Temp\explorer.exe
        "C:\Users\Admin\AppData\Local\Temp\explorer.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3112
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Add-MpPreference -ExclusionPath C:\
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2456
        • C:\Users\Admin\Documents\explorer.exe
          "C:\Users\Admin\Documents\explorer.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4480
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell Add-MpPreference -ExclusionPath C:\
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3672
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe"
            4⤵
              PID:3268
        • C:\Users\Admin\AppData\Local\Temp\updater.exe
          "C:\Users\Admin\AppData\Local\Temp\updater.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4764
        • C:\Users\Admin\AppData\Local\Temp\Client.exe
          "C:\Users\Admin\AppData\Local\Temp\Client.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1772
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1772 -s 1148
            3⤵
            • Program crash
            PID:1960
        • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
          "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Earn-BTC.xls"
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:2880
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 448 -p 1772 -ip 1772
        1⤵
          PID:4348

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          968cb9309758126772781b83adb8a28f

          SHA1

          8da30e71accf186b2ba11da1797cf67f8f78b47c

          SHA256

          92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

          SHA512

          4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          18KB

          MD5

          2025d07e52a2b5f294a5bd4e961b055e

          SHA1

          dbd7b16bee6318c0a512f73fe26b6331408e6718

          SHA256

          7ee944e432894918bebe6c2afd995e95c0e1eef7b6410beca942b27f232ecbad

          SHA512

          bf4d7d699af5cdb7f28115b5f305a29933e51ca828b524f818f97cc874b177f4399417c9d64629f2423366ed64ed4a5ea13406ef708a4ec28796ddbf38cccb02

        • C:\Users\Admin\AppData\Local\Temp\CUVZTV.vbs

          Filesize

          832B

          MD5

          7b88dc87f846cb86651815d1f650ddc5

          SHA1

          a9556677d0d28d3fe13468f55b3c1352eaf0cb87

          SHA256

          f2ac23ed9e1bd7a05bc3a41aa53637e49fb22185619dcb038479c453ac369e1f

          SHA512

          e400d521a0025973f98137ecceede2780b0b199cc98ba9dc08291641615df3b6ce4f0a9ce4bfacf82649cbc7ccd6f8aee9816c4588924f15f6de8858cb78bb6e

        • C:\Users\Admin\AppData\Local\Temp\Client.exe

          Filesize

          56KB

          MD5

          3893f505845ffd46a1df8553badef1d6

          SHA1

          683c728f6b35ac1ef27daf1f2f4225568a6a9fe5

          SHA256

          49e60ea90cc69fcb424f82db5dc51788c0d578c3cc6ba2db75323d751f4e6b03

          SHA512

          543233493adf120e12e0e8e39d6166bde0ed84f78634a2273ad09b5f0ae69f43055a117e1708bb0528b0349d3e802ba222f6cd2dfca993ba48d16ac270d07989

        • C:\Users\Admin\AppData\Local\Temp\Client.exe

          Filesize

          56KB

          MD5

          3893f505845ffd46a1df8553badef1d6

          SHA1

          683c728f6b35ac1ef27daf1f2f4225568a6a9fe5

          SHA256

          49e60ea90cc69fcb424f82db5dc51788c0d578c3cc6ba2db75323d751f4e6b03

          SHA512

          543233493adf120e12e0e8e39d6166bde0ed84f78634a2273ad09b5f0ae69f43055a117e1708bb0528b0349d3e802ba222f6cd2dfca993ba48d16ac270d07989

        • C:\Users\Admin\AppData\Local\Temp\Earn-BTC.xls

          Filesize

          36KB

          MD5

          daf929792f34ede3c3b0a195d4c26698

          SHA1

          1444b5688381e749389c1aae7c3462467e108be2

          SHA256

          6d918879e5d5c89895bcff592151ad0214435835e81731612530a357a5aef99e

          SHA512

          fc166da9ee699ebfefc816596f93d13d8693e0764ee49bd8490fa84b0dd0ded0e6ec70e639e5fd5cbec52b887fb4e281cd2493e06562a22cd684a0b5e155e892

        • C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe

          Filesize

          1.1MB

          MD5

          f0f663b62326867adc306451762414b2

          SHA1

          0dd272467164856dacbdca66f5eea4b7a6100a76

          SHA256

          2f850169f3bd43936dfc32e0cf0bfbab58ce9dd70e598d151ecfe0ef09a3e499

          SHA512

          90f18b1a93bbbbf4b75466b6f484c811440311833fa574176ae9e6eee535aaf36c46ec420872752aba906cc271c5fa06f26f2b5fd09e33951e1ef969dc882fea

        • C:\Users\Admin\AppData\Local\Temp\XRCCYX.exe

          Filesize

          1.1MB

          MD5

          f0f663b62326867adc306451762414b2

          SHA1

          0dd272467164856dacbdca66f5eea4b7a6100a76

          SHA256

          2f850169f3bd43936dfc32e0cf0bfbab58ce9dd70e598d151ecfe0ef09a3e499

          SHA512

          90f18b1a93bbbbf4b75466b6f484c811440311833fa574176ae9e6eee535aaf36c46ec420872752aba906cc271c5fa06f26f2b5fd09e33951e1ef969dc882fea

        • C:\Users\Admin\AppData\Local\Temp\explorer.exe

          Filesize

          132KB

          MD5

          6323c6a420ae7a3b7ace4a0a7bca4edd

          SHA1

          77b91d13642dfe93784470893111742c123c2244

          SHA256

          2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

          SHA512

          bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

        • C:\Users\Admin\AppData\Local\Temp\explorer.exe

          Filesize

          132KB

          MD5

          6323c6a420ae7a3b7ace4a0a7bca4edd

          SHA1

          77b91d13642dfe93784470893111742c123c2244

          SHA256

          2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

          SHA512

          bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

        • C:\Users\Admin\AppData\Local\Temp\updater.exe

          Filesize

          3.8MB

          MD5

          4ab049723f3f39517e74252409d34cc3

          SHA1

          7115fdc392fb8972c368f13c394f045ff76355fc

          SHA256

          9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

          SHA512

          7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

        • C:\Users\Admin\AppData\Local\Temp\updater.exe

          Filesize

          3.8MB

          MD5

          4ab049723f3f39517e74252409d34cc3

          SHA1

          7115fdc392fb8972c368f13c394f045ff76355fc

          SHA256

          9a5c441ddb5578d4f3d2f0c574c6b2311793b0f6fdb25ca437390a9d3aeaf49c

          SHA512

          7281cc6cd16f2f0174af814ba8e38f7f7fffe1503ddcc42954111371b16e61157c66667b6511a107adc853b25383978f1d531a05d2075e05deee28428e20386f

        • C:\Users\Admin\Documents\explorer.exe

          Filesize

          132KB

          MD5

          6323c6a420ae7a3b7ace4a0a7bca4edd

          SHA1

          77b91d13642dfe93784470893111742c123c2244

          SHA256

          2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

          SHA512

          bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

        • C:\Users\Admin\Documents\explorer.exe

          Filesize

          132KB

          MD5

          6323c6a420ae7a3b7ace4a0a7bca4edd

          SHA1

          77b91d13642dfe93784470893111742c123c2244

          SHA256

          2fb55700d343afcad180486bedddb4ce8a632d11cbbde696d8db7a165543ae90

          SHA512

          bba9ad737f58366d4d34493652bdc247e5afc3884259bdf2035576ded750e3663bd946b7b0996a5e91015465ada8f162e65b2fcaaab963767395b1fbe447675c

        • memory/1772-179-0x00007FF817010000-0x00007FF817AD1000-memory.dmp

          Filesize

          10.8MB

        • memory/1772-142-0x0000000000000000-mapping.dmp

        • memory/1772-146-0x00000000009C0000-0x00000000009D4000-memory.dmp

          Filesize

          80KB

        • memory/1772-147-0x00007FF817010000-0x00007FF817AD1000-memory.dmp

          Filesize

          10.8MB

        • memory/2456-162-0x0000000005C60000-0x0000000005CC6000-memory.dmp

          Filesize

          408KB

        • memory/2456-171-0x0000000006860000-0x000000000687E000-memory.dmp

          Filesize

          120KB

        • memory/2456-181-0x00000000078E0000-0x00000000078E8000-memory.dmp

          Filesize

          32KB

        • memory/2456-153-0x0000000000000000-mapping.dmp

        • memory/2456-180-0x0000000007900000-0x000000000791A000-memory.dmp

          Filesize

          104KB

        • memory/2456-155-0x0000000004D00000-0x0000000004D36000-memory.dmp

          Filesize

          216KB

        • memory/2456-178-0x00000000077F0000-0x00000000077FE000-memory.dmp

          Filesize

          56KB

        • memory/2456-157-0x0000000005370000-0x0000000005998000-memory.dmp

          Filesize

          6.2MB

        • memory/2456-176-0x0000000007840000-0x00000000078D6000-memory.dmp

          Filesize

          600KB

        • memory/2456-158-0x0000000005B50000-0x0000000005B72000-memory.dmp

          Filesize

          136KB

        • memory/2456-174-0x0000000007630000-0x000000000763A000-memory.dmp

          Filesize

          40KB

        • memory/2456-161-0x0000000005BF0000-0x0000000005C56000-memory.dmp

          Filesize

          408KB

        • memory/2456-173-0x00000000075C0000-0x00000000075DA000-memory.dmp

          Filesize

          104KB

        • memory/2456-163-0x00000000062C0000-0x00000000062DE000-memory.dmp

          Filesize

          120KB

        • memory/2456-172-0x0000000007C00000-0x000000000827A000-memory.dmp

          Filesize

          6.5MB

        • memory/2456-170-0x000000006ED00000-0x000000006ED4C000-memory.dmp

          Filesize

          304KB

        • memory/2456-169-0x0000000006880000-0x00000000068B2000-memory.dmp

          Filesize

          200KB

        • memory/2664-164-0x0000000000000000-mapping.dmp

        • memory/2672-132-0x0000000000000000-mapping.dmp

        • memory/2880-149-0x00007FF7F5170000-0x00007FF7F5180000-memory.dmp

          Filesize

          64KB

        • memory/2880-151-0x00007FF7F5170000-0x00007FF7F5180000-memory.dmp

          Filesize

          64KB

        • memory/2880-193-0x00007FF7F5170000-0x00007FF7F5180000-memory.dmp

          Filesize

          64KB

        • memory/2880-148-0x00007FF7F5170000-0x00007FF7F5180000-memory.dmp

          Filesize

          64KB

        • memory/2880-194-0x00007FF7F5170000-0x00007FF7F5180000-memory.dmp

          Filesize

          64KB

        • memory/2880-145-0x0000000000000000-mapping.dmp

        • memory/2880-192-0x00007FF7F5170000-0x00007FF7F5180000-memory.dmp

          Filesize

          64KB

        • memory/2880-191-0x00007FF7F5170000-0x00007FF7F5180000-memory.dmp

          Filesize

          64KB

        • memory/2880-156-0x00007FF7F2860000-0x00007FF7F2870000-memory.dmp

          Filesize

          64KB

        • memory/2880-150-0x00007FF7F5170000-0x00007FF7F5180000-memory.dmp

          Filesize

          64KB

        • memory/2880-154-0x00007FF7F2860000-0x00007FF7F2870000-memory.dmp

          Filesize

          64KB

        • memory/2880-152-0x00007FF7F5170000-0x00007FF7F5180000-memory.dmp

          Filesize

          64KB

        • memory/3112-135-0x0000000000000000-mapping.dmp

        • memory/3268-185-0x0000000000000000-mapping.dmp

        • memory/3268-186-0x0000000000B10000-0x0000000000B11000-memory.dmp

          Filesize

          4KB

        • memory/3672-182-0x000000006ED00000-0x000000006ED4C000-memory.dmp

          Filesize

          304KB

        • memory/3672-177-0x0000000000000000-mapping.dmp

        • memory/4480-166-0x0000000000000000-mapping.dmp

        • memory/4764-138-0x0000000000000000-mapping.dmp

        • memory/4764-141-0x0000000000400000-0x00000000007CE000-memory.dmp

          Filesize

          3.8MB

        • memory/4764-187-0x00000000745D0000-0x0000000074609000-memory.dmp

          Filesize

          228KB

        • memory/4764-188-0x0000000073CC0000-0x0000000073CF9000-memory.dmp

          Filesize

          228KB

        • memory/4764-189-0x0000000073AF0000-0x0000000073B29000-memory.dmp

          Filesize

          228KB

        • memory/4764-159-0x0000000073CC0000-0x0000000073CF9000-memory.dmp

          Filesize

          228KB

        • memory/4764-160-0x0000000073AF0000-0x0000000073B29000-memory.dmp

          Filesize

          228KB