Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 11:22
Static task
static1
Behavioral task
behavioral1
Sample
Petro-LPO-206101-371220326BOQ.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Petro-LPO-206101-371220326BOQ.exe
Resource
win10v2004-20221111-en
General
-
Target
Petro-LPO-206101-371220326BOQ.exe
-
Size
834KB
-
MD5
c41ab4abfd11308b0f3b10cbd57a3a36
-
SHA1
85959216592c0ca55c91b880c242d2ff7eeca49d
-
SHA256
3da539d2f3f68c823e556e637665b03f2501e510c36db2429fe17ad44e903da6
-
SHA512
04cc28f9f8b0bae22dfcff965faef945937e5a4fe8b8ab1a795a32ac8d30b11c647b2f0a37f6f32d723211dc8bba3050f3032c5c2f1c6f397d3643320c39a637
-
SSDEEP
12288:L6mvmrAIpXGkCHR3uU9M4/1Y2lranhBzDwvZ+v6cxa:LdmrAIpX5ZWY2ehBG+vy
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\bsfgmanh.exe," reg.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/5032-148-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral2/memory/5032-150-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral2/memory/5032-151-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral2/memory/5032-171-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat -
Executes dropped EXE 4 IoCs
Processes:
bsfgmanh.execrsscrs.exe102.execrsscrs.exepid process 2248 bsfgmanh.exe 2892 crsscrs.exe 4460 102.exe 3420 crsscrs.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
AddInProcess32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\Microsoft DN1\\sqlmap.dll" AddInProcess32.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\102.exe upx C:\Users\Admin\AppData\Local\Temp\102.exe upx behavioral2/memory/4460-165-0x0000000000C20000-0x0000000000C4D000-memory.dmp upx behavioral2/memory/4460-172-0x0000000000C20000-0x0000000000C4D000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bsfgmanh.execrsscrs.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation bsfgmanh.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation crsscrs.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 2140 svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
AddInProcess32.exedescription ioc process File created C:\Windows\System32\rfxvmt.dll AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bsfgmanh.exedescription pid process target process PID 2248 set thread context of 5032 2248 bsfgmanh.exe AddInProcess32.exe -
Drops file in Program Files directory 2 IoCs
Processes:
AddInProcess32.exedescription ioc process File created C:\Program Files\Microsoft DN1\sqlmap.dll AddInProcess32.exe File created C:\Program Files\Microsoft DN1\rdpwrap.ini AddInProcess32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 5004 PING.EXE 4816 PING.EXE 3356 PING.EXE -
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
Petro-LPO-206101-371220326BOQ.exebsfgmanh.execrsscrs.execrsscrs.exesvchost.exepid process 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 1272 Petro-LPO-206101-371220326BOQ.exe 2248 bsfgmanh.exe 2248 bsfgmanh.exe 2248 bsfgmanh.exe 2892 crsscrs.exe 3420 crsscrs.exe 3420 crsscrs.exe 3420 crsscrs.exe 2248 bsfgmanh.exe 2248 bsfgmanh.exe 2248 bsfgmanh.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 652 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Petro-LPO-206101-371220326BOQ.exebsfgmanh.execrsscrs.execrsscrs.exeAddInProcess32.exesvchost.exedescription pid process Token: SeDebugPrivilege 1272 Petro-LPO-206101-371220326BOQ.exe Token: SeDebugPrivilege 2248 bsfgmanh.exe Token: SeDebugPrivilege 2892 crsscrs.exe Token: SeDebugPrivilege 3420 crsscrs.exe Token: SeDebugPrivilege 5032 AddInProcess32.exe Token: SeAuditPrivilege 2140 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AddInProcess32.exepid process 5032 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
Petro-LPO-206101-371220326BOQ.execmd.execmd.exebsfgmanh.exeAddInProcess32.exe102.execrsscrs.exedescription pid process target process PID 1272 wrote to memory of 2296 1272 Petro-LPO-206101-371220326BOQ.exe cmd.exe PID 1272 wrote to memory of 2296 1272 Petro-LPO-206101-371220326BOQ.exe cmd.exe PID 1272 wrote to memory of 2296 1272 Petro-LPO-206101-371220326BOQ.exe cmd.exe PID 2296 wrote to memory of 5004 2296 cmd.exe PING.EXE PID 2296 wrote to memory of 5004 2296 cmd.exe PING.EXE PID 2296 wrote to memory of 5004 2296 cmd.exe PING.EXE PID 1272 wrote to memory of 4940 1272 Petro-LPO-206101-371220326BOQ.exe cmd.exe PID 1272 wrote to memory of 4940 1272 Petro-LPO-206101-371220326BOQ.exe cmd.exe PID 1272 wrote to memory of 4940 1272 Petro-LPO-206101-371220326BOQ.exe cmd.exe PID 4940 wrote to memory of 4816 4940 cmd.exe PING.EXE PID 4940 wrote to memory of 4816 4940 cmd.exe PING.EXE PID 4940 wrote to memory of 4816 4940 cmd.exe PING.EXE PID 2296 wrote to memory of 4244 2296 cmd.exe reg.exe PID 2296 wrote to memory of 4244 2296 cmd.exe reg.exe PID 2296 wrote to memory of 4244 2296 cmd.exe reg.exe PID 4940 wrote to memory of 3356 4940 cmd.exe PING.EXE PID 4940 wrote to memory of 3356 4940 cmd.exe PING.EXE PID 4940 wrote to memory of 3356 4940 cmd.exe PING.EXE PID 4940 wrote to memory of 2248 4940 cmd.exe bsfgmanh.exe PID 4940 wrote to memory of 2248 4940 cmd.exe bsfgmanh.exe PID 4940 wrote to memory of 2248 4940 cmd.exe bsfgmanh.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 5032 2248 bsfgmanh.exe AddInProcess32.exe PID 2248 wrote to memory of 2892 2248 bsfgmanh.exe crsscrs.exe PID 2248 wrote to memory of 2892 2248 bsfgmanh.exe crsscrs.exe PID 2248 wrote to memory of 2892 2248 bsfgmanh.exe crsscrs.exe PID 5032 wrote to memory of 4460 5032 AddInProcess32.exe 102.exe PID 5032 wrote to memory of 4460 5032 AddInProcess32.exe 102.exe PID 5032 wrote to memory of 4460 5032 AddInProcess32.exe 102.exe PID 4460 wrote to memory of 4524 4460 102.exe netsh.exe PID 4460 wrote to memory of 4524 4460 102.exe netsh.exe PID 4460 wrote to memory of 4524 4460 102.exe netsh.exe PID 2892 wrote to memory of 3420 2892 crsscrs.exe crsscrs.exe PID 2892 wrote to memory of 3420 2892 crsscrs.exe crsscrs.exe PID 2892 wrote to memory of 3420 2892 crsscrs.exe crsscrs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Petro-LPO-206101-371220326BOQ.exe"C:\Users\Admin\AppData\Local\Temp\Petro-LPO-206101-371220326BOQ.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 8 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\bsfgmanh.exe,"2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 83⤵
- Runs ping.exe
PID:5004
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\bsfgmanh.exe,"3⤵
- Modifies WinLogon for persistence
PID:4244
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 9 > nul && copy "C:\Users\Admin\AppData\Local\Temp\Petro-LPO-206101-371220326BOQ.exe" "C:\Users\Admin\AppData\Roaming\bsfgmanh.exe" && ping 127.0.0.1 -n 9 > nul && "C:\Users\Admin\AppData\Roaming\bsfgmanh.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 93⤵
- Runs ping.exe
PID:4816
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 93⤵
- Runs ping.exe
PID:3356
-
-
C:\Users\Admin\AppData\Roaming\bsfgmanh.exe"C:\Users\Admin\AppData\Roaming\bsfgmanh.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\102.exe"C:\Users\Admin\AppData\Local\Temp\102.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="3389" dir=in action=allow protocol=TCP localport=33896⤵
- Modifies Windows Firewall
PID:4524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\crsscrs.exe"C:\Users\Admin\AppData\Local\Temp\crsscrs.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\crsscrs.exe"C:\Users\Admin\AppData\Local\Temp\crsscrs.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:5108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26
-
Filesize
1KB
MD57dca233df92b3884663fa5a40db8d49c
SHA1208b8f27b708c4e06ac37f974471cc7b29c29b60
SHA25690c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c
SHA512d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07
-
Filesize
70KB
MD5ca96229390a0e6a53e8f2125f2c01114
SHA1a54b1081cf58724f8cb292b4d165dfee2fb1c9f6
SHA2560df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c
SHA512e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef
-
Filesize
70KB
MD5ca96229390a0e6a53e8f2125f2c01114
SHA1a54b1081cf58724f8cb292b4d165dfee2fb1c9f6
SHA2560df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c
SHA512e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
54B
MD501cf047fcbf38b35470b9470973759e8
SHA1dc81f8f3a2a307010955df6ff1284552fd19a5be
SHA256968308903b833acba30fbcc7efe9d5ef4958995290c72222efa4cae01917ccd4
SHA512c9d69f61923c92c4f101ed45c5c7b4a2b22064ec3f089b3724fd4f478e3ef9219235c56d8a91ca1812842988f7807c67a0d26f010d811991194e510e743a3e86
-
Filesize
57B
MD5d78f74a603525b58b00bf42087b7e1b4
SHA15f5b11045d630b834d9750bd4135d0fd87d2636b
SHA256e2e64f6853fd6078b25e9aef43a3877e991751f2b46be55dfd44dbf8915ca00f
SHA5123b0082fe6907c26dcea9caa1fe2a57e03a7000e32d711d5191f7b4800ec3ad1aac59502dad384fce63d6351c4b22d0faeee8edeadb3be7cf09aaaa60dfa8fb1f
-
Filesize
57B
MD5fb911eabd4782498f04be4242a99112d
SHA15661406bfb655247579299155c3a14f2cbaf1693
SHA25637fe82f575f95ee285076a7cf0e2b21067b948536fe99292d2234de5fb4a50e6
SHA512cbdd7ba441d191fde0e4f02d7b799fbbd97930fd866e2afea94f04eb32caa6fd40e293585f848c178643461954d6571e38f0eeb9d99a31c53f1a6dfb3c020c49
-
Filesize
834KB
MD5c41ab4abfd11308b0f3b10cbd57a3a36
SHA185959216592c0ca55c91b880c242d2ff7eeca49d
SHA2563da539d2f3f68c823e556e637665b03f2501e510c36db2429fe17ad44e903da6
SHA51204cc28f9f8b0bae22dfcff965faef945937e5a4fe8b8ab1a795a32ac8d30b11c647b2f0a37f6f32d723211dc8bba3050f3032c5c2f1c6f397d3643320c39a637
-
Filesize
834KB
MD5c41ab4abfd11308b0f3b10cbd57a3a36
SHA185959216592c0ca55c91b880c242d2ff7eeca49d
SHA2563da539d2f3f68c823e556e637665b03f2501e510c36db2429fe17ad44e903da6
SHA51204cc28f9f8b0bae22dfcff965faef945937e5a4fe8b8ab1a795a32ac8d30b11c647b2f0a37f6f32d723211dc8bba3050f3032c5c2f1c6f397d3643320c39a637
-
Filesize
291KB
MD5914d30cdc026d77366e6ac105cd5eefc
SHA195e0c8463f4995bf126fa0cffab4a8a947963a1a
SHA256f00109618610375ea494b1406fa7e5548d75a52669b1bf1761a80394301b42f8
SHA512184c1c12c18b02e27a8674476c768b0dcaef7dff722dfd27e4f342ba7ce65653c399eed0bedc3d9cbca0fec0fa5a17077e8e71f4d7807e2119eec1687ccc7635
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26