Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2023, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
ReminttanceInvoices.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ReminttanceInvoices.exe
Resource
win10v2004-20220812-en
General
-
Target
ReminttanceInvoices.exe
-
Size
804KB
-
MD5
af9debe623afb659ca86811ca214520f
-
SHA1
fa5d07f60bcdc8b6f1443b2bd378a4a6122ae78d
-
SHA256
bcf890c1ff2d59b5efe9cc9094d369c23ddee9975752365fa2bfd74cd0885c2b
-
SHA512
2b2f53b5228efb4b32d13af01047ce84944d8a3945bddda7ab78f0a6e55e285d0f39a624984711036f085b970d345dc47329c8890a6c650cef375f8938409ec8
-
SSDEEP
12288:fh6q6EMwYC0ND571Vd8dHd+pu/aYoEXjr6kdAn1cGG0qpAnnLYPhsh3:fYXwQ57jCVSYBykdAn1cGG0qpeLYqh3
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ReminttanceInvoices.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4056 set thread context of 4288 4056 ReminttanceInvoices.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4268 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4056 ReminttanceInvoices.exe 3548 powershell.exe 668 powershell.exe 4056 ReminttanceInvoices.exe 4056 ReminttanceInvoices.exe 4056 ReminttanceInvoices.exe 4056 ReminttanceInvoices.exe 4056 ReminttanceInvoices.exe 3548 powershell.exe 668 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4056 ReminttanceInvoices.exe Token: SeDebugPrivilege 3548 powershell.exe Token: SeDebugPrivilege 668 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4056 wrote to memory of 668 4056 ReminttanceInvoices.exe 88 PID 4056 wrote to memory of 668 4056 ReminttanceInvoices.exe 88 PID 4056 wrote to memory of 668 4056 ReminttanceInvoices.exe 88 PID 4056 wrote to memory of 3548 4056 ReminttanceInvoices.exe 90 PID 4056 wrote to memory of 3548 4056 ReminttanceInvoices.exe 90 PID 4056 wrote to memory of 3548 4056 ReminttanceInvoices.exe 90 PID 4056 wrote to memory of 4268 4056 ReminttanceInvoices.exe 92 PID 4056 wrote to memory of 4268 4056 ReminttanceInvoices.exe 92 PID 4056 wrote to memory of 4268 4056 ReminttanceInvoices.exe 92 PID 4056 wrote to memory of 1652 4056 ReminttanceInvoices.exe 94 PID 4056 wrote to memory of 1652 4056 ReminttanceInvoices.exe 94 PID 4056 wrote to memory of 1652 4056 ReminttanceInvoices.exe 94 PID 4056 wrote to memory of 4416 4056 ReminttanceInvoices.exe 95 PID 4056 wrote to memory of 4416 4056 ReminttanceInvoices.exe 95 PID 4056 wrote to memory of 4416 4056 ReminttanceInvoices.exe 95 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96 PID 4056 wrote to memory of 4288 4056 ReminttanceInvoices.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ReminttanceInvoices.exe"C:\Users\Admin\AppData\Local\Temp\ReminttanceInvoices.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ReminttanceInvoices.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ySfDHKGmE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ySfDHKGmE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2AD9.tmp"2⤵
- Creates scheduled task(s)
PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\ReminttanceInvoices.exe"C:\Users\Admin\AppData\Local\Temp\ReminttanceInvoices.exe"2⤵PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\ReminttanceInvoices.exe"C:\Users\Admin\AppData\Local\Temp\ReminttanceInvoices.exe"2⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\ReminttanceInvoices.exe"C:\Users\Admin\AppData\Local\Temp\ReminttanceInvoices.exe"2⤵PID:4288
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD53e4e81ffd87f9fc6264ba4634cdd4a8d
SHA1cfc782dc65a2b9fecee736589f3f8f2584e06bf3
SHA25631e5102b77915d4f362c7410f4323f2c31171a7719fb81cd032ce9851de162e0
SHA51244515abf81ba847fa465eb5bc260321e9618d4308215e4ebb6ea84360e71b72ef00d2b3ed666e5a47f9f86df3e79cd564a15040b5035f8c2a20867254a3087bf
-
Filesize
1KB
MD5e62812e46a0aa9a8feafbb02c5aabad5
SHA1f557d09571e0f7762a5910e223daed43eb250bea
SHA256a04ddd083bd703905018ceee577f03e83bfabad06064939dba7bee7d4bd66eb1
SHA51281f181029a39272059cede796d0539a8ab78df284367e5a39ab4a8356f7bb307fb0714934df50d44ec79896be58191f47fcfd82df66dc7fdb6e8335aab6c9c05