Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2022 12:59

General

  • Target

    Invoice n 20220610.exe

  • Size

    834KB

  • MD5

    c41ab4abfd11308b0f3b10cbd57a3a36

  • SHA1

    85959216592c0ca55c91b880c242d2ff7eeca49d

  • SHA256

    3da539d2f3f68c823e556e637665b03f2501e510c36db2429fe17ad44e903da6

  • SHA512

    04cc28f9f8b0bae22dfcff965faef945937e5a4fe8b8ab1a795a32ac8d30b11c647b2f0a37f6f32d723211dc8bba3050f3032c5c2f1c6f397d3643320c39a637

  • SSDEEP

    12288:L6mvmrAIpXGkCHR3uU9M4/1Y2lranhBzDwvZ+v6cxa:LdmrAIpX5ZWY2ehBG+vy

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 4 IoCs
  • Executes dropped EXE 4 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Invoice n 20220610.exe
    "C:\Users\Admin\AppData\Local\Temp\Invoice n 20220610.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\bsfgmanh.exe,"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4412
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 6
        3⤵
        • Runs ping.exe
        PID:3980
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\bsfgmanh.exe,"
        3⤵
        • Modifies WinLogon for persistence
        PID:4384
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 15 > nul && copy "C:\Users\Admin\AppData\Local\Temp\Invoice n 20220610.exe" "C:\Users\Admin\AppData\Roaming\bsfgmanh.exe" && ping 127.0.0.1 -n 15 > nul && "C:\Users\Admin\AppData\Roaming\bsfgmanh.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3744
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 15
        3⤵
        • Runs ping.exe
        PID:4548
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 15
        3⤵
        • Runs ping.exe
        PID:3608
      • C:\Users\Admin\AppData\Roaming\bsfgmanh.exe
        "C:\Users\Admin\AppData\Roaming\bsfgmanh.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2928
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
          • Sets DLL path for service in the registry
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3620
          • C:\Users\Admin\AppData\Local\Temp\31.exe
            "C:\Users\Admin\AppData\Local\Temp\31.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2144
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name="3389" dir=in action=allow protocol=TCP localport=3389
              6⤵
              • Modifies Windows Firewall
              PID:396
        • C:\Users\Admin\AppData\Local\Temp\crsscrs.exe
          "C:\Users\Admin\AppData\Local\Temp\crsscrs.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5004
          • C:\Users\Admin\AppData\Local\Temp\crsscrs.exe
            "C:\Users\Admin\AppData\Local\Temp\crsscrs.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2692
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -s TermService
    1⤵
      PID:2616
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -s TermService
      1⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:780

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft DN1\sqlmap.dll

      Filesize

      114KB

      MD5

      461ade40b800ae80a40985594e1ac236

      SHA1

      b3892eef846c044a2b0785d54a432b3e93a968c8

      SHA256

      798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4

      SHA512

      421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\crsscrs.exe.log

      Filesize

      1KB

      MD5

      7dca233df92b3884663fa5a40db8d49c

      SHA1

      208b8f27b708c4e06ac37f974471cc7b29c29b60

      SHA256

      90c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c

      SHA512

      d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07

    • C:\Users\Admin\AppData\Local\Temp\31.exe

      Filesize

      70KB

      MD5

      ca96229390a0e6a53e8f2125f2c01114

      SHA1

      a54b1081cf58724f8cb292b4d165dfee2fb1c9f6

      SHA256

      0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c

      SHA512

      e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef

    • C:\Users\Admin\AppData\Local\Temp\31.exe

      Filesize

      70KB

      MD5

      ca96229390a0e6a53e8f2125f2c01114

      SHA1

      a54b1081cf58724f8cb292b4d165dfee2fb1c9f6

      SHA256

      0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c

      SHA512

      e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef

    • C:\Users\Admin\AppData\Local\Temp\crsscrs.exe

      Filesize

      76KB

      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\crsscrs.exe

      Filesize

      76KB

      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\crsscrs.exe

      Filesize

      76KB

      MD5

      0e362e7005823d0bec3719b902ed6d62

      SHA1

      590d860b909804349e0cdc2f1662b37bd62f7463

      SHA256

      2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

      SHA512

      518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

    • C:\Users\Admin\AppData\Local\Temp\crsscrs.txt

      Filesize

      54B

      MD5

      85b40fa003363382fabb1af156d9eb56

      SHA1

      13cd63fc54174fb3b3e63dc66765e5a16581eeb0

      SHA256

      eabce51193e9cb78a3034258b82e4985a6d0b5902c2b585bc76c0286f1ff85f0

      SHA512

      14fef12d6492f16914dac0cbcd9291308e34fd9fc80c57ec48be113a60cb701df23a5b3b72fb90bae83e26a4c27ce5cd3cda0d443d814339e8d7c7732e08b1cf

    • C:\Users\Admin\AppData\Local\Temp\crsscrs.txt

      Filesize

      57B

      MD5

      89f0d3081908c26467818651a0d045bc

      SHA1

      bd1ea5ebdc5768f1d81bcc8d739f0de2386171a2

      SHA256

      d2d12dbfe4ade7f41607c0a6f491eb18278c51d53e296b942bd85c415c6e1e0a

      SHA512

      f3e4977f3bbe09f1fc2e782d114ab2f711cf938315f47a714ecb7814a70069ebe1c7d9527e5a09f2832c61b2eab04ba81132f2c79f8e30edd54295e0e5222f9c

    • C:\Users\Admin\AppData\Local\Temp\crsscrs.txt

      Filesize

      57B

      MD5

      89f0d3081908c26467818651a0d045bc

      SHA1

      bd1ea5ebdc5768f1d81bcc8d739f0de2386171a2

      SHA256

      d2d12dbfe4ade7f41607c0a6f491eb18278c51d53e296b942bd85c415c6e1e0a

      SHA512

      f3e4977f3bbe09f1fc2e782d114ab2f711cf938315f47a714ecb7814a70069ebe1c7d9527e5a09f2832c61b2eab04ba81132f2c79f8e30edd54295e0e5222f9c

    • C:\Users\Admin\AppData\Roaming\bsfgmanh.exe

      Filesize

      834KB

      MD5

      c41ab4abfd11308b0f3b10cbd57a3a36

      SHA1

      85959216592c0ca55c91b880c242d2ff7eeca49d

      SHA256

      3da539d2f3f68c823e556e637665b03f2501e510c36db2429fe17ad44e903da6

      SHA512

      04cc28f9f8b0bae22dfcff965faef945937e5a4fe8b8ab1a795a32ac8d30b11c647b2f0a37f6f32d723211dc8bba3050f3032c5c2f1c6f397d3643320c39a637

    • C:\Users\Admin\AppData\Roaming\bsfgmanh.exe

      Filesize

      834KB

      MD5

      c41ab4abfd11308b0f3b10cbd57a3a36

      SHA1

      85959216592c0ca55c91b880c242d2ff7eeca49d

      SHA256

      3da539d2f3f68c823e556e637665b03f2501e510c36db2429fe17ad44e903da6

      SHA512

      04cc28f9f8b0bae22dfcff965faef945937e5a4fe8b8ab1a795a32ac8d30b11c647b2f0a37f6f32d723211dc8bba3050f3032c5c2f1c6f397d3643320c39a637

    • \??\c:\program files\microsoft dn1\rdpwrap.ini

      Filesize

      291KB

      MD5

      914d30cdc026d77366e6ac105cd5eefc

      SHA1

      95e0c8463f4995bf126fa0cffab4a8a947963a1a

      SHA256

      f00109618610375ea494b1406fa7e5548d75a52669b1bf1761a80394301b42f8

      SHA512

      184c1c12c18b02e27a8674476c768b0dcaef7dff722dfd27e4f342ba7ce65653c399eed0bedc3d9cbca0fec0fa5a17077e8e71f4d7807e2119eec1687ccc7635

    • \??\c:\program files\microsoft dn1\sqlmap.dll

      Filesize

      114KB

      MD5

      461ade40b800ae80a40985594e1ac236

      SHA1

      b3892eef846c044a2b0785d54a432b3e93a968c8

      SHA256

      798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4

      SHA512

      421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26

    • memory/396-167-0x0000000000000000-mapping.dmp

    • memory/2144-164-0x0000000000000000-mapping.dmp

    • memory/2144-168-0x0000000000D20000-0x0000000000D4D000-memory.dmp

      Filesize

      180KB

    • memory/2144-172-0x0000000000D20000-0x0000000000D4D000-memory.dmp

      Filesize

      180KB

    • memory/2268-135-0x0000000005AB0000-0x0000000005B4C000-memory.dmp

      Filesize

      624KB

    • memory/2268-132-0x0000000000C40000-0x0000000000D16000-memory.dmp

      Filesize

      856KB

    • memory/2268-136-0x0000000006EA0000-0x0000000006EAA000-memory.dmp

      Filesize

      40KB

    • memory/2268-133-0x0000000005E70000-0x0000000006414000-memory.dmp

      Filesize

      5.6MB

    • memory/2268-134-0x0000000005970000-0x0000000005A02000-memory.dmp

      Filesize

      584KB

    • memory/2692-157-0x0000000000000000-mapping.dmp

    • memory/2928-146-0x00000000008D0000-0x00000000009A6000-memory.dmp

      Filesize

      856KB

    • memory/2928-143-0x0000000000000000-mapping.dmp

    • memory/3608-142-0x0000000000000000-mapping.dmp

    • memory/3620-147-0x0000000000000000-mapping.dmp

    • memory/3620-148-0x0000000000400000-0x0000000000568000-memory.dmp

      Filesize

      1.4MB

    • memory/3620-162-0x0000000000400000-0x0000000000568000-memory.dmp

      Filesize

      1.4MB

    • memory/3620-151-0x0000000000400000-0x0000000000568000-memory.dmp

      Filesize

      1.4MB

    • memory/3620-163-0x000000000AE70000-0x000000000B010000-memory.dmp

      Filesize

      1.6MB

    • memory/3620-150-0x0000000000400000-0x0000000000568000-memory.dmp

      Filesize

      1.4MB

    • memory/3744-139-0x0000000000000000-mapping.dmp

    • memory/3980-138-0x0000000000000000-mapping.dmp

    • memory/4384-141-0x0000000000000000-mapping.dmp

    • memory/4412-137-0x0000000000000000-mapping.dmp

    • memory/4548-140-0x0000000000000000-mapping.dmp

    • memory/5004-155-0x0000000000770000-0x000000000078A000-memory.dmp

      Filesize

      104KB

    • memory/5004-152-0x0000000000000000-mapping.dmp