Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15-03-2023 17:41

General

  • Target

    Solicitud de Cotización (Ulatina) 15-03-23·pd.exe

  • Size

    267KB

  • MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

  • SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

  • SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

  • SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • SSDEEP

    6144:GDOmbbC0309OSXjr2Z2UCEVSOuzAtf/QZv3z9jnnOldiUf:4bZ309//2HCEVNuzaf/QZvj1nki

Malware Config

Extracted

Family

warzonerat

C2

dnmpbczm0963fxtdplc.duckdns.org:5689

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 5 IoCs
  • Checks QEMU agent file 2 TTPs 4 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solicitud de Cotización (Ulatina) 15-03-23·pd.exe
    "C:\Users\Admin\AppData\Local\Temp\Solicitud de Cotización (Ulatina) 15-03-23·pd.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\Solicitud de Cotización (Ulatina) 15-03-23·pd.exe
      "C:\Users\Admin\AppData\Local\Temp\Solicitud de Cotización (Ulatina) 15-03-23·pd.exe"
      2⤵
      • Checks QEMU agent file
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:596
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Add-MpPreference -ExclusionPath C:\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:584
      • C:\Users\Admin\Documents\Windows.exe
        "C:\Users\Admin\Documents\Windows.exe"
        3⤵
        • Checks QEMU agent file
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Users\Admin\Documents\Windows.exe
          "C:\Users\Admin\Documents\Windows.exe"
          4⤵
          • Checks QEMU agent file
          • Loads dropped DLL
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:296

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_E32DA5C2498E8CF7649760B1F24B32AF
    Filesize

    471B

    MD5

    f404c86bd5c34759a2d966fd219cbf2e

    SHA1

    323a73895f6345d7e5b80fa9092fba269797ad94

    SHA256

    332b2a32eb2fa8fdbd424442f4618cc5902110099e65cf06ed9fd7e3ef0638dd

    SHA512

    2819708bf17d2378ec7e86c177307d4d02db421bd78154af54b324f436ceb2d4f96540373095c7e220081e2684c94d0436c988ff19e889736980766056b8c21e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\646C991C2A28825F3CC56E0A1D1E3FA9
    Filesize

    1KB

    MD5

    10acdcbd363e8bb18bef42973fc98b5a

    SHA1

    b000860b66aa964c8b7073fe736d6c84aeb69f7d

    SHA256

    5c353cd9f6e85a408242f8e0bc0158b8e3b975173253f4c8e553b1acd5a836d9

    SHA512

    a642545beb57fc22fb18d34471be79bc7f0279266b2e317af1433e01c426062a0048d6087b5955001126a64dbe79a189c70074daf16048716b48a4d6b6dc7665

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    Filesize

    724B

    MD5

    f569e1d183b84e8078dc456192127536

    SHA1

    30c537463eed902925300dd07a87d820a713753f

    SHA256

    287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

    SHA512

    49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_75B7C74DAC2A7692FAD0A4B72A918B03
    Filesize

    471B

    MD5

    ad8c85c44804fefc0a7bb63fc0e67734

    SHA1

    43492fc02c98b775a4aefbf88b62b99d844f2fe5

    SHA256

    99085ce1c4abe0d7361b2cfba610aff4b2b0e97b6ae6dd6c9734d8366afe0665

    SHA512

    483462e24068170a79e403920064a994ad4977965fb561748cae942d1bf2020ac8696412893d33eeb89b1623477a67d5b6f418e4b8f5fb91035835000920876c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_E32DA5C2498E8CF7649760B1F24B32AF
    Filesize

    406B

    MD5

    52c4ce520286ede52025f441c3eea8e4

    SHA1

    93e852d98077c6927b10cc8df6027f461f091e9a

    SHA256

    800dabd0be08038136c6d392164b7361acc369301bbf88b93d742640b0a3cab9

    SHA512

    708ed723fa742ce04b08608adaf13749500828d76e935fceb230c33bf5c5a4481a88d0599ac282f57fa6a8de4f57e0c7767ae928f7df971ed7ccff19a2b5270e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\646C991C2A28825F3CC56E0A1D1E3FA9
    Filesize

    184B

    MD5

    1328f3634527bca9a561c27fdc91840e

    SHA1

    5456560d402a725f8b2e01cca1be017bd921c7cc

    SHA256

    c0ed9205741e50ba7c5ea9d0eb0e179784533ceb788a8626c259e4c5a5665b71

    SHA512

    c99b214ca03990f453e6e8c9c3236facee0276d59f0bf7d8c2f6d5275e9b68052d091bfab3bb4b757f8e32d6a44ce6a0a6399d886f20606e31723e308f593769

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    931765fedbc97668ef30af9411d63523

    SHA1

    3474f94e98afd700560887153c7126a82f94efd3

    SHA256

    74b8a26ca44cca53cc496eb97b7ce79bd3bfdaf5b835030c96be2b833324d2ac

    SHA512

    86076b1ba008595e99d477c5a28500839c8cd1f4a3a70415fb1053b4371a5fbfafc0a987d4a7c87c1e639f44399a622cff21f78ac129b97b78c6bff6aa01570e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    Filesize

    392B

    MD5

    f8fe65d735061b4c644f095546156c15

    SHA1

    5acf7ddd694b653816e2b73c2102eda076eb4316

    SHA256

    01345e6060a364074d485db82d974874b18d43611bd4af3ff2ba14d821366e0d

    SHA512

    a14ed69c619d2f78e9c9ff07fd8ec07992a008d0c860cdb22df5b6bd9a4f51051e402bb2ff710ddc1bdb6a3e809eed5b670ac05a5a73bc3ca04a38ee8690dedd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_75B7C74DAC2A7692FAD0A4B72A918B03
    Filesize

    406B

    MD5

    c6657ff89f85f60827d860999ce175af

    SHA1

    d64890dafe807805066e7eb923ec902d4908139f

    SHA256

    faec21723d490d82211c625f4222cf06992daa41236fab51aa88ba56e0799c83

    SHA512

    b3394df708a4c60877653c328710859609cbd218826031a36d9c2a0cdd8d2be93049efca353821a4ec3de85746ea53bef70b292cd750a6c22574ae8634521b14

  • C:\Users\Admin\AppData\Local\Temp\CabFEF9.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\nsz7A12.tmp\System.dll
    Filesize

    11KB

    MD5

    b0c77267f13b2f87c084fd86ef51ccfc

    SHA1

    f7543f9e9b4f04386dfbf33c38cbed1bf205afb3

    SHA256

    a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77

    SHA512

    f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e

  • C:\Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • C:\Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • C:\Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • C:\Users\Admin\Doliolidae\Flugtskydninger\Privatvejens\Haandfuldenes\Impregnating\Kontaktcentrenes.Fla
    Filesize

    236KB

    MD5

    b7d956e078c957cb5360c4ea2d3c2273

    SHA1

    c628a326cf84d3dae3554e68fda7a3ea00a1b92f

    SHA256

    ff47cd620bf8e3272e23989d45344b155305fe012786d5cd36daae86e437fdf1

    SHA512

    c0a8f0d04295f810988e4cef08ee036326f1fc2247d2c35480fd9d019e0014f6a96ed07c0bf299fe230cb1f107f83c32bde8c04ae7445c6aa6eff881ae9f10f8

  • C:\Users\Admin\Doliolidae\Flugtskydninger\Privatvejens\Haandfuldenes\Impregnating\Superprecise.Jum
    Filesize

    89KB

    MD5

    951a26dcadeac34af41bc733cec364c1

    SHA1

    113d2cd326d79e26f9df13f1637b1d62de5e68b7

    SHA256

    a3bc552ffe558a34a32cce7e4cb9b90d36ec8971f29d408ef9ed2f519a60525c

    SHA512

    2d6987fbf99db85ccc7c5a6f3fa87f003d982ba06d5ba5e5e79f1f797399fa283cc3790483e9acb62a2e744c2accab433c26234e341ec0f9797d74d2fcfed378

  • \Users\Admin\AppData\Local\Temp\nsi6E5.tmp\System.dll
    Filesize

    11KB

    MD5

    b0c77267f13b2f87c084fd86ef51ccfc

    SHA1

    f7543f9e9b4f04386dfbf33c38cbed1bf205afb3

    SHA256

    a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77

    SHA512

    f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e

  • \Users\Admin\AppData\Local\Temp\nsz7A12.tmp\System.dll
    Filesize

    11KB

    MD5

    b0c77267f13b2f87c084fd86ef51ccfc

    SHA1

    f7543f9e9b4f04386dfbf33c38cbed1bf205afb3

    SHA256

    a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77

    SHA512

    f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e

  • \Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • memory/296-161-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/296-160-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/296-157-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/296-163-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/296-139-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/296-140-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/584-119-0x0000000002780000-0x00000000027C0000-memory.dmp
    Filesize

    256KB

  • memory/596-77-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/596-108-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/596-105-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/596-81-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/596-79-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/596-78-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/596-109-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/596-126-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/596-125-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/1408-76-0x0000000002FB0000-0x0000000003EDF000-memory.dmp
    Filesize

    15.2MB

  • memory/1408-75-0x0000000002FB0000-0x0000000003EDF000-memory.dmp
    Filesize

    15.2MB

  • memory/1612-137-0x0000000002F90000-0x0000000003EBF000-memory.dmp
    Filesize

    15.2MB

  • memory/1612-136-0x0000000002F90000-0x0000000003EBF000-memory.dmp
    Filesize

    15.2MB