Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2022 12:59
Static task
static1
Behavioral task
behavioral1
Sample
Invoice n� 20220610.lzh
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Invoice n� 20220610.lzh
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Invoice n 20220610.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Invoice n 20220610.exe
Resource
win10v2004-20220812-en
General
-
Target
Invoice n 20220610.exe
-
Size
834KB
-
MD5
c41ab4abfd11308b0f3b10cbd57a3a36
-
SHA1
85959216592c0ca55c91b880c242d2ff7eeca49d
-
SHA256
3da539d2f3f68c823e556e637665b03f2501e510c36db2429fe17ad44e903da6
-
SHA512
04cc28f9f8b0bae22dfcff965faef945937e5a4fe8b8ab1a795a32ac8d30b11c647b2f0a37f6f32d723211dc8bba3050f3032c5c2f1c6f397d3643320c39a637
-
SSDEEP
12288:L6mvmrAIpXGkCHR3uU9M4/1Y2lranhBzDwvZ+v6cxa:LdmrAIpX5ZWY2ehBG+vy
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\bsfgmanh.exe," reg.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule behavioral4/memory/3620-148-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral4/memory/3620-150-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral4/memory/3620-151-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral4/memory/3620-162-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat -
Executes dropped EXE 4 IoCs
Processes:
bsfgmanh.execrsscrs.execrsscrs.exe31.exepid process 2928 bsfgmanh.exe 5004 crsscrs.exe 2692 crsscrs.exe 2144 31.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\Microsoft DN1\\sqlmap.dll" AddInProcess32.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\31.exe upx C:\Users\Admin\AppData\Local\Temp\31.exe upx behavioral4/memory/2144-168-0x0000000000D20000-0x0000000000D4D000-memory.dmp upx behavioral4/memory/2144-172-0x0000000000D20000-0x0000000000D4D000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bsfgmanh.execrsscrs.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation bsfgmanh.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation crsscrs.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 780 svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
AddInProcess32.exedescription ioc process File created C:\Windows\System32\rfxvmt.dll AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bsfgmanh.exedescription pid process target process PID 2928 set thread context of 3620 2928 bsfgmanh.exe AddInProcess32.exe -
Drops file in Program Files directory 2 IoCs
Processes:
AddInProcess32.exedescription ioc process File created C:\Program Files\Microsoft DN1\rdpwrap.ini AddInProcess32.exe File created C:\Program Files\Microsoft DN1\sqlmap.dll AddInProcess32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 3608 PING.EXE 3980 PING.EXE 4548 PING.EXE -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
Invoice n 20220610.exebsfgmanh.execrsscrs.execrsscrs.exesvchost.exepid process 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2268 Invoice n 20220610.exe 2928 bsfgmanh.exe 2928 bsfgmanh.exe 2928 bsfgmanh.exe 5004 crsscrs.exe 2692 crsscrs.exe 2692 crsscrs.exe 2692 crsscrs.exe 2928 bsfgmanh.exe 2928 bsfgmanh.exe 780 svchost.exe 780 svchost.exe 780 svchost.exe 780 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 648 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Invoice n 20220610.exebsfgmanh.execrsscrs.execrsscrs.exeAddInProcess32.exesvchost.exedescription pid process Token: SeDebugPrivilege 2268 Invoice n 20220610.exe Token: SeDebugPrivilege 2928 bsfgmanh.exe Token: SeDebugPrivilege 5004 crsscrs.exe Token: SeDebugPrivilege 2692 crsscrs.exe Token: SeDebugPrivilege 3620 AddInProcess32.exe Token: SeAuditPrivilege 780 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AddInProcess32.exepid process 3620 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
Invoice n 20220610.execmd.execmd.exebsfgmanh.execrsscrs.exeAddInProcess32.exe31.exedescription pid process target process PID 2268 wrote to memory of 4412 2268 Invoice n 20220610.exe cmd.exe PID 2268 wrote to memory of 4412 2268 Invoice n 20220610.exe cmd.exe PID 2268 wrote to memory of 4412 2268 Invoice n 20220610.exe cmd.exe PID 4412 wrote to memory of 3980 4412 cmd.exe PING.EXE PID 4412 wrote to memory of 3980 4412 cmd.exe PING.EXE PID 4412 wrote to memory of 3980 4412 cmd.exe PING.EXE PID 2268 wrote to memory of 3744 2268 Invoice n 20220610.exe cmd.exe PID 2268 wrote to memory of 3744 2268 Invoice n 20220610.exe cmd.exe PID 2268 wrote to memory of 3744 2268 Invoice n 20220610.exe cmd.exe PID 3744 wrote to memory of 4548 3744 cmd.exe PING.EXE PID 3744 wrote to memory of 4548 3744 cmd.exe PING.EXE PID 3744 wrote to memory of 4548 3744 cmd.exe PING.EXE PID 4412 wrote to memory of 4384 4412 cmd.exe reg.exe PID 4412 wrote to memory of 4384 4412 cmd.exe reg.exe PID 4412 wrote to memory of 4384 4412 cmd.exe reg.exe PID 3744 wrote to memory of 3608 3744 cmd.exe PING.EXE PID 3744 wrote to memory of 3608 3744 cmd.exe PING.EXE PID 3744 wrote to memory of 3608 3744 cmd.exe PING.EXE PID 3744 wrote to memory of 2928 3744 cmd.exe bsfgmanh.exe PID 3744 wrote to memory of 2928 3744 cmd.exe bsfgmanh.exe PID 3744 wrote to memory of 2928 3744 cmd.exe bsfgmanh.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 3620 2928 bsfgmanh.exe AddInProcess32.exe PID 2928 wrote to memory of 5004 2928 bsfgmanh.exe crsscrs.exe PID 2928 wrote to memory of 5004 2928 bsfgmanh.exe crsscrs.exe PID 2928 wrote to memory of 5004 2928 bsfgmanh.exe crsscrs.exe PID 5004 wrote to memory of 2692 5004 crsscrs.exe crsscrs.exe PID 5004 wrote to memory of 2692 5004 crsscrs.exe crsscrs.exe PID 5004 wrote to memory of 2692 5004 crsscrs.exe crsscrs.exe PID 3620 wrote to memory of 2144 3620 AddInProcess32.exe 31.exe PID 3620 wrote to memory of 2144 3620 AddInProcess32.exe 31.exe PID 3620 wrote to memory of 2144 3620 AddInProcess32.exe 31.exe PID 2144 wrote to memory of 396 2144 31.exe netsh.exe PID 2144 wrote to memory of 396 2144 31.exe netsh.exe PID 2144 wrote to memory of 396 2144 31.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Invoice n 20220610.exe"C:\Users\Admin\AppData\Local\Temp\Invoice n 20220610.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\bsfgmanh.exe,"2⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 63⤵
- Runs ping.exe
PID:3980
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\bsfgmanh.exe,"3⤵
- Modifies WinLogon for persistence
PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 15 > nul && copy "C:\Users\Admin\AppData\Local\Temp\Invoice n 20220610.exe" "C:\Users\Admin\AppData\Roaming\bsfgmanh.exe" && ping 127.0.0.1 -n 15 > nul && "C:\Users\Admin\AppData\Roaming\bsfgmanh.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 153⤵
- Runs ping.exe
PID:4548
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 153⤵
- Runs ping.exe
PID:3608
-
-
C:\Users\Admin\AppData\Roaming\bsfgmanh.exe"C:\Users\Admin\AppData\Roaming\bsfgmanh.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\31.exe"C:\Users\Admin\AppData\Local\Temp\31.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="3389" dir=in action=allow protocol=TCP localport=33896⤵
- Modifies Windows Firewall
PID:396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\crsscrs.exe"C:\Users\Admin\AppData\Local\Temp\crsscrs.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\crsscrs.exe"C:\Users\Admin\AppData\Local\Temp\crsscrs.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:2616
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26
-
Filesize
1KB
MD57dca233df92b3884663fa5a40db8d49c
SHA1208b8f27b708c4e06ac37f974471cc7b29c29b60
SHA25690c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c
SHA512d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07
-
Filesize
70KB
MD5ca96229390a0e6a53e8f2125f2c01114
SHA1a54b1081cf58724f8cb292b4d165dfee2fb1c9f6
SHA2560df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c
SHA512e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef
-
Filesize
70KB
MD5ca96229390a0e6a53e8f2125f2c01114
SHA1a54b1081cf58724f8cb292b4d165dfee2fb1c9f6
SHA2560df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c
SHA512e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
54B
MD585b40fa003363382fabb1af156d9eb56
SHA113cd63fc54174fb3b3e63dc66765e5a16581eeb0
SHA256eabce51193e9cb78a3034258b82e4985a6d0b5902c2b585bc76c0286f1ff85f0
SHA51214fef12d6492f16914dac0cbcd9291308e34fd9fc80c57ec48be113a60cb701df23a5b3b72fb90bae83e26a4c27ce5cd3cda0d443d814339e8d7c7732e08b1cf
-
Filesize
57B
MD589f0d3081908c26467818651a0d045bc
SHA1bd1ea5ebdc5768f1d81bcc8d739f0de2386171a2
SHA256d2d12dbfe4ade7f41607c0a6f491eb18278c51d53e296b942bd85c415c6e1e0a
SHA512f3e4977f3bbe09f1fc2e782d114ab2f711cf938315f47a714ecb7814a70069ebe1c7d9527e5a09f2832c61b2eab04ba81132f2c79f8e30edd54295e0e5222f9c
-
Filesize
57B
MD589f0d3081908c26467818651a0d045bc
SHA1bd1ea5ebdc5768f1d81bcc8d739f0de2386171a2
SHA256d2d12dbfe4ade7f41607c0a6f491eb18278c51d53e296b942bd85c415c6e1e0a
SHA512f3e4977f3bbe09f1fc2e782d114ab2f711cf938315f47a714ecb7814a70069ebe1c7d9527e5a09f2832c61b2eab04ba81132f2c79f8e30edd54295e0e5222f9c
-
Filesize
834KB
MD5c41ab4abfd11308b0f3b10cbd57a3a36
SHA185959216592c0ca55c91b880c242d2ff7eeca49d
SHA2563da539d2f3f68c823e556e637665b03f2501e510c36db2429fe17ad44e903da6
SHA51204cc28f9f8b0bae22dfcff965faef945937e5a4fe8b8ab1a795a32ac8d30b11c647b2f0a37f6f32d723211dc8bba3050f3032c5c2f1c6f397d3643320c39a637
-
Filesize
834KB
MD5c41ab4abfd11308b0f3b10cbd57a3a36
SHA185959216592c0ca55c91b880c242d2ff7eeca49d
SHA2563da539d2f3f68c823e556e637665b03f2501e510c36db2429fe17ad44e903da6
SHA51204cc28f9f8b0bae22dfcff965faef945937e5a4fe8b8ab1a795a32ac8d30b11c647b2f0a37f6f32d723211dc8bba3050f3032c5c2f1c6f397d3643320c39a637
-
Filesize
291KB
MD5914d30cdc026d77366e6ac105cd5eefc
SHA195e0c8463f4995bf126fa0cffab4a8a947963a1a
SHA256f00109618610375ea494b1406fa7e5548d75a52669b1bf1761a80394301b42f8
SHA512184c1c12c18b02e27a8674476c768b0dcaef7dff722dfd27e4f342ba7ce65653c399eed0bedc3d9cbca0fec0fa5a17077e8e71f4d7807e2119eec1687ccc7635
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26