Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 00:54

General

  • Target

    f8ba9d5452a2fa864ab9859198adc3c3.exe

  • Size

    1020KB

  • MD5

    f8ba9d5452a2fa864ab9859198adc3c3

  • SHA1

    8b1ea66c5df1db1f41b65e228de61f2490474e8a

  • SHA256

    08b3142a71983995fa6b5f9f4d8bb3c3be1506f9ca1f0e569e1d0e20ec2bf2f0

  • SHA512

    2ba11710c6eca4c68168b36c9de0e7ba3e943b3fd022a378019493b1488da753cb950bd8f4abfa23c3a7d82d1b1ad3df4efc50270174ad45c94afc3e09be77a1

  • SSDEEP

    24576:Q12dBx8r0ewCE1fjxWRnTMboTiwAAgEEY4:/dBx8r0vZ5lWRoboTQp

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe
    "C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3548
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gPCxJeGH.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4048
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gPCxJeGH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5C39.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1164
    • C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe
      "C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe"
      2⤵
        PID:1372
      • C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe
        "C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4040
        • C:\Users\Admin\Documents\images.exe
          "C:\Users\Admin\Documents\images.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:476
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gPCxJeGH.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:308
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gPCxJeGH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4AE.tmp"
            4⤵
            • Creates scheduled task(s)
            PID:1976
          • C:\Users\Admin\Documents\images.exe
            "C:\Users\Admin\Documents\images.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4888
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe"
              5⤵
                PID:1932

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
        Filesize

        2KB

        MD5

        968cb9309758126772781b83adb8a28f

        SHA1

        8da30e71accf186b2ba11da1797cf67f8f78b47c

        SHA256

        92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

        SHA512

        4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
        Filesize

        18KB

        MD5

        9b4e0f1f444e5527a1a7b4edbc315c08

        SHA1

        9e038562751419dd7aeecf3ed68ba3ea1b54014c

        SHA256

        7d87c634776670958c1c182cfa35900dfcdd593c5d2eb2b48430c18ee3666915

        SHA512

        44373b21fe250ca0d6a1422d4813175b2f4d1cdf8acc5d475e2aa390586da082e9911229987666c65c71a85d1634c5c72d82a9f7a059615fe33bab0a6d4d6dad

      • C:\Users\Admin\AppData\Local\Temp\tmp4AE.tmp
        Filesize

        1KB

        MD5

        faa43cf176440f8cfb0a3bc0088e3999

        SHA1

        96e1276dc5e31990f48b594f6c641edb9bf26374

        SHA256

        4229573924915927dec9a9e2f964ebdbc687323a82fa2f16f7f74894087fb8d3

        SHA512

        54a9b5329d716ffc2cd14a4b49ee4bd779984238dd5fadfadd3a94a8f217b0a0a2c994fdde7d6de0c1821b50d06ded8fcb4eaef92b5eec5edb1f1ee133013d55

      • C:\Users\Admin\AppData\Local\Temp\tmp5C39.tmp
        Filesize

        1KB

        MD5

        faa43cf176440f8cfb0a3bc0088e3999

        SHA1

        96e1276dc5e31990f48b594f6c641edb9bf26374

        SHA256

        4229573924915927dec9a9e2f964ebdbc687323a82fa2f16f7f74894087fb8d3

        SHA512

        54a9b5329d716ffc2cd14a4b49ee4bd779984238dd5fadfadd3a94a8f217b0a0a2c994fdde7d6de0c1821b50d06ded8fcb4eaef92b5eec5edb1f1ee133013d55

      • C:\Users\Admin\Documents\images.exe
        Filesize

        1020KB

        MD5

        f8ba9d5452a2fa864ab9859198adc3c3

        SHA1

        8b1ea66c5df1db1f41b65e228de61f2490474e8a

        SHA256

        08b3142a71983995fa6b5f9f4d8bb3c3be1506f9ca1f0e569e1d0e20ec2bf2f0

        SHA512

        2ba11710c6eca4c68168b36c9de0e7ba3e943b3fd022a378019493b1488da753cb950bd8f4abfa23c3a7d82d1b1ad3df4efc50270174ad45c94afc3e09be77a1

      • C:\Users\Admin\Documents\images.exe
        Filesize

        1020KB

        MD5

        f8ba9d5452a2fa864ab9859198adc3c3

        SHA1

        8b1ea66c5df1db1f41b65e228de61f2490474e8a

        SHA256

        08b3142a71983995fa6b5f9f4d8bb3c3be1506f9ca1f0e569e1d0e20ec2bf2f0

        SHA512

        2ba11710c6eca4c68168b36c9de0e7ba3e943b3fd022a378019493b1488da753cb950bd8f4abfa23c3a7d82d1b1ad3df4efc50270174ad45c94afc3e09be77a1

      • C:\Users\Admin\Documents\images.exe
        Filesize

        1020KB

        MD5

        f8ba9d5452a2fa864ab9859198adc3c3

        SHA1

        8b1ea66c5df1db1f41b65e228de61f2490474e8a

        SHA256

        08b3142a71983995fa6b5f9f4d8bb3c3be1506f9ca1f0e569e1d0e20ec2bf2f0

        SHA512

        2ba11710c6eca4c68168b36c9de0e7ba3e943b3fd022a378019493b1488da753cb950bd8f4abfa23c3a7d82d1b1ad3df4efc50270174ad45c94afc3e09be77a1

      • memory/308-177-0x00000000716C0000-0x000000007170C000-memory.dmp
        Filesize

        304KB

      • memory/308-166-0x0000000000000000-mapping.dmp
      • memory/476-152-0x0000000000000000-mapping.dmp
      • memory/1164-138-0x0000000000000000-mapping.dmp
      • memory/1372-141-0x0000000000000000-mapping.dmp
      • memory/1932-178-0x0000000000000000-mapping.dmp
      • memory/1932-179-0x0000000000BE0000-0x0000000000BE1000-memory.dmp
        Filesize

        4KB

      • memory/1976-167-0x0000000000000000-mapping.dmp
      • memory/3548-132-0x0000000000F50000-0x0000000001056000-memory.dmp
        Filesize

        1.0MB

      • memory/3548-136-0x000000000B810000-0x000000000B8AC000-memory.dmp
        Filesize

        624KB

      • memory/3548-135-0x0000000007ED0000-0x0000000007EDA000-memory.dmp
        Filesize

        40KB

      • memory/3548-134-0x0000000007F50000-0x0000000007FE2000-memory.dmp
        Filesize

        584KB

      • memory/3548-133-0x0000000008460000-0x0000000008A04000-memory.dmp
        Filesize

        5.6MB

      • memory/4040-143-0x0000000000400000-0x0000000000568000-memory.dmp
        Filesize

        1.4MB

      • memory/4040-150-0x0000000000400000-0x0000000000568000-memory.dmp
        Filesize

        1.4MB

      • memory/4040-155-0x0000000000400000-0x0000000000568000-memory.dmp
        Filesize

        1.4MB

      • memory/4040-142-0x0000000000000000-mapping.dmp
      • memory/4040-146-0x0000000000400000-0x0000000000568000-memory.dmp
        Filesize

        1.4MB

      • memory/4048-160-0x0000000007850000-0x000000000786A000-memory.dmp
        Filesize

        104KB

      • memory/4048-147-0x0000000005480000-0x00000000054A2000-memory.dmp
        Filesize

        136KB

      • memory/4048-151-0x0000000006560000-0x000000000657E000-memory.dmp
        Filesize

        120KB

      • memory/4048-161-0x00000000078C0000-0x00000000078CA000-memory.dmp
        Filesize

        40KB

      • memory/4048-162-0x0000000007AD0000-0x0000000007B66000-memory.dmp
        Filesize

        600KB

      • memory/4048-163-0x0000000007A90000-0x0000000007A9E000-memory.dmp
        Filesize

        56KB

      • memory/4048-164-0x0000000007B90000-0x0000000007BAA000-memory.dmp
        Filesize

        104KB

      • memory/4048-165-0x0000000007B80000-0x0000000007B88000-memory.dmp
        Filesize

        32KB

      • memory/4048-158-0x0000000006AF0000-0x0000000006B0E000-memory.dmp
        Filesize

        120KB

      • memory/4048-149-0x0000000005DE0000-0x0000000005E46000-memory.dmp
        Filesize

        408KB

      • memory/4048-148-0x0000000005620000-0x0000000005686000-memory.dmp
        Filesize

        408KB

      • memory/4048-159-0x0000000007EA0000-0x000000000851A000-memory.dmp
        Filesize

        6.5MB

      • memory/4048-137-0x0000000000000000-mapping.dmp
      • memory/4048-157-0x00000000712A0000-0x00000000712EC000-memory.dmp
        Filesize

        304KB

      • memory/4048-139-0x0000000002C40000-0x0000000002C76000-memory.dmp
        Filesize

        216KB

      • memory/4048-145-0x00000000057B0000-0x0000000005DD8000-memory.dmp
        Filesize

        6.2MB

      • memory/4048-156-0x0000000006B10000-0x0000000006B42000-memory.dmp
        Filesize

        200KB

      • memory/4888-176-0x0000000000400000-0x0000000000568000-memory.dmp
        Filesize

        1.4MB

      • memory/4888-174-0x0000000000400000-0x0000000000568000-memory.dmp
        Filesize

        1.4MB

      • memory/4888-170-0x0000000000000000-mapping.dmp
      • memory/4888-180-0x0000000000400000-0x0000000000568000-memory.dmp
        Filesize

        1.4MB