Analysis

  • max time kernel
    135s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 13:29

General

  • Target

    ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44.exe

  • Size

    708KB

  • MD5

    ecb6e0b8c1c969fb81be1b5d52ea4bab

  • SHA1

    aa7d5a7a84f7a2b24d5177bfc147561964d0a250

  • SHA256

    ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

  • SHA512

    4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

  • SSDEEP

    12288:NGcpdQGrhJFun+3L04NtfzaAixx2L6sqyHdUPsjIPF81DLAIM:ND2Grg+I4Ntfzay3UMiFay

Malware Config

Extracted

Family

warzonerat

C2

bedahogs.100chickens.me:6093

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44.exe
    "C:\Users\Admin\AppData\Local\Temp\ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\REQUEST-QUOTATION.GIF
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1352
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.vbs"
      2⤵
      • Adds Run key to start application
      PID:1304
    • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr
      "C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr" /S
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr
        C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr" /S
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe"
          4⤵
            PID:1408

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\REQUEST-QUOTATION.GIF

      Filesize

      11KB

      MD5

      278956f711ed61cbd3c2823479ff8d1f

      SHA1

      6c13dc9edbc8d32785161a656416ec05e90b6012

      SHA256

      cab4061a6c121e1e6223c87c53b016fa0087236453a6b1e449efbf6571a19c92

      SHA512

      29874611477a5c704d2a911e384221542cb27e6b1d887be99d95fba97d50e5151f8007e1df96052595df5ef53367659b5191c2e0ea13bfb216f76afbd473f489

    • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr

      Filesize

      708KB

      MD5

      ecb6e0b8c1c969fb81be1b5d52ea4bab

      SHA1

      aa7d5a7a84f7a2b24d5177bfc147561964d0a250

      SHA256

      ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

      SHA512

      4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

    • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr

      Filesize

      708KB

      MD5

      ecb6e0b8c1c969fb81be1b5d52ea4bab

      SHA1

      aa7d5a7a84f7a2b24d5177bfc147561964d0a250

      SHA256

      ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

      SHA512

      4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

    • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr

      Filesize

      708KB

      MD5

      ecb6e0b8c1c969fb81be1b5d52ea4bab

      SHA1

      aa7d5a7a84f7a2b24d5177bfc147561964d0a250

      SHA256

      ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

      SHA512

      4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

    • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.vbs

      Filesize

      1024B

      MD5

      c8aec1dc4775b2f9bfb3944b596bcfa1

      SHA1

      5b6188ac37ab8b6a0ef4ffea82a284abc5d40898

      SHA256

      3fb9caeff6259d6131fc1b43d57d6409866ce5541313098d8471b694d7996264

      SHA512

      e350218d945b9b1166c0404cdc50930d9bc89391bc19f8eb562692394270543c02076d29db900b440c96110ac0d2c03a63335320d4da352730875c7c8dc82e4e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FXNUESG2.txt

      Filesize

      539B

      MD5

      368b36e6af231cbe7db54efc79323f9f

      SHA1

      5193d1cbb31056972782a1d55eef7ec9608fdefb

      SHA256

      83cba73eb4b3aa92ab5f243258a55e9a8f9d96b9e3495e75019d6202007af7c6

      SHA512

      dab86cca47e28e9b313781d9f9a92d162f235cfe87166576d54d3c97d954168d2eea85f528a4374ac57f0aa1d823861ec0603255774f01273c422ffec83645cd

    • \Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr

      Filesize

      708KB

      MD5

      ecb6e0b8c1c969fb81be1b5d52ea4bab

      SHA1

      aa7d5a7a84f7a2b24d5177bfc147561964d0a250

      SHA256

      ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

      SHA512

      4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

    • \Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr

      Filesize

      708KB

      MD5

      ecb6e0b8c1c969fb81be1b5d52ea4bab

      SHA1

      aa7d5a7a84f7a2b24d5177bfc147561964d0a250

      SHA256

      ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

      SHA512

      4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

    • \Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr

      Filesize

      708KB

      MD5

      ecb6e0b8c1c969fb81be1b5d52ea4bab

      SHA1

      aa7d5a7a84f7a2b24d5177bfc147561964d0a250

      SHA256

      ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

      SHA512

      4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

    • memory/1040-80-0x0000000077000000-0x00000000771A9000-memory.dmp

      Filesize

      1.7MB

    • memory/1040-83-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/1040-89-0x0000000000220000-0x0000000000227000-memory.dmp

      Filesize

      28KB

    • memory/1040-82-0x0000000000400000-0x00000000004B6000-memory.dmp

      Filesize

      728KB

    • memory/1040-81-0x00000000771E0000-0x0000000077360000-memory.dmp

      Filesize

      1.5MB

    • memory/1408-91-0x0000000000120000-0x0000000000121000-memory.dmp

      Filesize

      4KB

    • memory/1572-78-0x00000000771E0000-0x0000000077360000-memory.dmp

      Filesize

      1.5MB

    • memory/1572-77-0x0000000077000000-0x00000000771A9000-memory.dmp

      Filesize

      1.7MB

    • memory/1572-76-0x0000000000270000-0x0000000000277000-memory.dmp

      Filesize

      28KB

    • memory/1964-56-0x0000000000280000-0x0000000000287000-memory.dmp

      Filesize

      28KB

    • memory/1964-67-0x00000000771E0000-0x0000000077360000-memory.dmp

      Filesize

      1.5MB

    • memory/1964-65-0x0000000077000000-0x00000000771A9000-memory.dmp

      Filesize

      1.7MB

    • memory/1964-64-0x0000000000280000-0x0000000000287000-memory.dmp

      Filesize

      28KB

    • memory/1964-57-0x0000000075A11000-0x0000000075A13000-memory.dmp

      Filesize

      8KB