Analysis
-
max time kernel
152s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 17:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe
Resource
win10v2004-20221111-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe
-
Size
519KB
-
MD5
6befe3992722dca19208c0f70b3619c8
-
SHA1
a5195c8079150b8f7656e3dbff4011770088f503
-
SHA256
a72ff4b13f5202ef9baeadc24f27d69c3fcfbb5c2de54e0b5a79ec408f6d5aa4
-
SHA512
31cd22a945d785a6b6ed1bec884bcf1f054da1dfdb38d7b228a042397584581253ce36f8ab3ee2044dc232401288fb1e462e77fec35600c051b5dfec847aaa31
-
SSDEEP
12288:2ZLABfUncbo42eKEHjC87rntsjPNXF3Z7iq7wjx:2ZLuUwo42e5TWjPNFlw
Malware Config
Extracted
warzonerat
fukfndru.ddns.net:2928
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/596-66-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/596-67-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/596-69-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/596-70-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/596-71-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/596-72-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/596-75-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/596-76-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/596-81-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1648-99-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/1648-103-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1648-104-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
images.exeimages.exepid process 1788 images.exe 1648 images.exe -
Loads dropped DLL 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exepid process 596 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exeimages.exedescription pid process target process PID 1792 set thread context of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1788 set thread context of 1648 1788 images.exe images.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
images.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 images.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 images.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e images.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
images.exepid process 1648 images.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exeSecuriteInfo.com.Win32.PWSX-gen.22881.19782.exeimages.exeimages.exedescription pid process target process PID 1792 wrote to memory of 296 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe schtasks.exe PID 1792 wrote to memory of 296 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe schtasks.exe PID 1792 wrote to memory of 296 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe schtasks.exe PID 1792 wrote to memory of 296 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe schtasks.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 1792 wrote to memory of 596 1792 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe PID 596 wrote to memory of 1788 596 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe images.exe PID 596 wrote to memory of 1788 596 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe images.exe PID 596 wrote to memory of 1788 596 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe images.exe PID 596 wrote to memory of 1788 596 SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe images.exe PID 1788 wrote to memory of 528 1788 images.exe schtasks.exe PID 1788 wrote to memory of 528 1788 images.exe schtasks.exe PID 1788 wrote to memory of 528 1788 images.exe schtasks.exe PID 1788 wrote to memory of 528 1788 images.exe schtasks.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1788 wrote to memory of 1648 1788 images.exe images.exe PID 1648 wrote to memory of 1964 1648 images.exe cmd.exe PID 1648 wrote to memory of 1964 1648 images.exe cmd.exe PID 1648 wrote to memory of 1964 1648 images.exe cmd.exe PID 1648 wrote to memory of 1964 1648 images.exe cmd.exe PID 1648 wrote to memory of 1964 1648 images.exe cmd.exe PID 1648 wrote to memory of 1964 1648 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZqxbWYLRKd" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB4A0.tmp"2⤵
- Creates scheduled task(s)
PID:296
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.22881.19782.exe"{path}"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:596 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZqxbWYLRKd" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB368.tmp"4⤵
- Creates scheduled task(s)
PID:528
-
-
C:\ProgramData\images.exe"{path}"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵PID:1964
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
519KB
MD56befe3992722dca19208c0f70b3619c8
SHA1a5195c8079150b8f7656e3dbff4011770088f503
SHA256a72ff4b13f5202ef9baeadc24f27d69c3fcfbb5c2de54e0b5a79ec408f6d5aa4
SHA51231cd22a945d785a6b6ed1bec884bcf1f054da1dfdb38d7b228a042397584581253ce36f8ab3ee2044dc232401288fb1e462e77fec35600c051b5dfec847aaa31
-
Filesize
519KB
MD56befe3992722dca19208c0f70b3619c8
SHA1a5195c8079150b8f7656e3dbff4011770088f503
SHA256a72ff4b13f5202ef9baeadc24f27d69c3fcfbb5c2de54e0b5a79ec408f6d5aa4
SHA51231cd22a945d785a6b6ed1bec884bcf1f054da1dfdb38d7b228a042397584581253ce36f8ab3ee2044dc232401288fb1e462e77fec35600c051b5dfec847aaa31
-
Filesize
519KB
MD56befe3992722dca19208c0f70b3619c8
SHA1a5195c8079150b8f7656e3dbff4011770088f503
SHA256a72ff4b13f5202ef9baeadc24f27d69c3fcfbb5c2de54e0b5a79ec408f6d5aa4
SHA51231cd22a945d785a6b6ed1bec884bcf1f054da1dfdb38d7b228a042397584581253ce36f8ab3ee2044dc232401288fb1e462e77fec35600c051b5dfec847aaa31
-
Filesize
1KB
MD56460aea51f0359ee29bb0da3a96c4962
SHA18ffa24e943c64ad4d6ae980624e68ccc2a7230b2
SHA256e0d3b8a3f45896232ff4760d19525e4cfe8fdfa1606f8a69d051de056f1628a9
SHA51258f73d28b4b43e5457bc8380f1799dc02bc0428e9c90b913049162aac1ce70d04cf1a7c42e8a3ffa3f99274cc5c0228d00834ba912ec0f4edf632d4154bcfa17
-
Filesize
1KB
MD56460aea51f0359ee29bb0da3a96c4962
SHA18ffa24e943c64ad4d6ae980624e68ccc2a7230b2
SHA256e0d3b8a3f45896232ff4760d19525e4cfe8fdfa1606f8a69d051de056f1628a9
SHA51258f73d28b4b43e5457bc8380f1799dc02bc0428e9c90b913049162aac1ce70d04cf1a7c42e8a3ffa3f99274cc5c0228d00834ba912ec0f4edf632d4154bcfa17
-
Filesize
519KB
MD56befe3992722dca19208c0f70b3619c8
SHA1a5195c8079150b8f7656e3dbff4011770088f503
SHA256a72ff4b13f5202ef9baeadc24f27d69c3fcfbb5c2de54e0b5a79ec408f6d5aa4
SHA51231cd22a945d785a6b6ed1bec884bcf1f054da1dfdb38d7b228a042397584581253ce36f8ab3ee2044dc232401288fb1e462e77fec35600c051b5dfec847aaa31