Analysis

  • max time kernel
    142s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2023 06:50

General

  • Target

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f.exe

  • Size

    267KB

  • MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

  • SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

  • SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

  • SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • SSDEEP

    6144:GDOmbbC0309OSXjr2Z2UCEVSOuzAtf/QZv3z9jnnOldiUf:4bZ309//2HCEVNuzaf/QZvj1nki

Malware Config

Extracted

Family

warzonerat

C2

dnmpbczm0963fxtdplc.duckdns.org:5689

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 5 IoCs
  • Checks QEMU agent file 2 TTPs 4 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f.exe
    "C:\Users\Admin\AppData\Local\Temp\3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f.exe
      "C:\Users\Admin\AppData\Local\Temp\3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f.exe"
      2⤵
      • Checks QEMU agent file
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Add-MpPreference -ExclusionPath C:\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1728
      • C:\Users\Admin\Documents\Windows.exe
        "C:\Users\Admin\Documents\Windows.exe"
        3⤵
        • Checks QEMU agent file
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Users\Admin\Documents\Windows.exe
          "C:\Users\Admin\Documents\Windows.exe"
          4⤵
          • Checks QEMU agent file
          • Loads dropped DLL
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:376

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    1KB

    MD5

    1f627137c5e867b85ed836c42a683066

    SHA1

    2de36ecc16195807f0fb15d73098c52f6d8d7b04

    SHA256

    a12bca3422e1dca1969f7ae8688a36208dc5bf78fdc6e163ca5c14c841fe3496

    SHA512

    6a0d3b1765810a9dad849ba6df79b9b06357f26d46dc92603bc67dea852de14ecd83be45e0e68fe9421f62446805dad07e8bddd96d4b9aa5939a2a76a4b4f127

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_E32DA5C2498E8CF7649760B1F24B32AF
    Filesize

    471B

    MD5

    f404c86bd5c34759a2d966fd219cbf2e

    SHA1

    323a73895f6345d7e5b80fa9092fba269797ad94

    SHA256

    332b2a32eb2fa8fdbd424442f4618cc5902110099e65cf06ed9fd7e3ef0638dd

    SHA512

    2819708bf17d2378ec7e86c177307d4d02db421bd78154af54b324f436ceb2d4f96540373095c7e220081e2684c94d0436c988ff19e889736980766056b8c21e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    Filesize

    724B

    MD5

    f569e1d183b84e8078dc456192127536

    SHA1

    30c537463eed902925300dd07a87d820a713753f

    SHA256

    287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

    SHA512

    49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_75B7C74DAC2A7692FAD0A4B72A918B03
    Filesize

    471B

    MD5

    ad8c85c44804fefc0a7bb63fc0e67734

    SHA1

    43492fc02c98b775a4aefbf88b62b99d844f2fe5

    SHA256

    99085ce1c4abe0d7361b2cfba610aff4b2b0e97b6ae6dd6c9734d8366afe0665

    SHA512

    483462e24068170a79e403920064a994ad4977965fb561748cae942d1bf2020ac8696412893d33eeb89b1623477a67d5b6f418e4b8f5fb91035835000920876c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    410B

    MD5

    bbec88d4cb9e149a527f637490a8fe42

    SHA1

    0feb0570b2347208af0ddb04211477ff4b3fb202

    SHA256

    752c3eb87ce4ba6ae9626a720708fcdbc3f76ec44e8bb1ecb9b8240ea840d7d3

    SHA512

    30a262ff1866525a109774486555c9a2000aade943688877ab17f18b43bd7da1f29d5083c2e66868ced6eefabcb134ea26be94b28619e97fceef4004354ed13c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_E32DA5C2498E8CF7649760B1F24B32AF
    Filesize

    406B

    MD5

    e5be62138ddb08e8c221097d491aacb6

    SHA1

    f680076f125137a39899ea4bc92ef6ca021cd9c6

    SHA256

    3a12f8e0e34207e90c1f4be0c2f9c7838863e4229fddd0d5729f4354a62c986d

    SHA512

    69d5b1a257ace1ff622a62ae17876553eb6b1c93947743c28cfa8ea049ebbfbce0b34b078f1bf3bbed022a52c11d01024c757d4c73779db232198e26bbcbae33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b378adacf609821495977a75d6969300

    SHA1

    611d881e9c21a259ebe2a64f91130db4be7b4d2a

    SHA256

    e56ea3f324c8570f9cfb5a99d5c0737656d61f09470e6aefe360eb7ea74ab92c

    SHA512

    a775f357b6b99be74fc583adadacd466511d19cfbb327dc070075453de77f38e5626e7915503eab21443453c5b5e0c0cfba0864979269a81c0f687a6759ce546

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    Filesize

    392B

    MD5

    baeef3ed5fb5127c06b5269bf2ca5214

    SHA1

    60ea0021b84eb946e8248a4fe729194e400faefb

    SHA256

    aaf456e281a37128de6bfb3e6fbf3708ba42fd675179ad8a9a275e2211b90f22

    SHA512

    125594cd3ff13562c358f9abb858238c8f37eb87cad20e4f0002421ea989208500650de74fce4a69a2ea575fa9b2cc289ce0a9312ce0206a8923d1d77cc8ae00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_75B7C74DAC2A7692FAD0A4B72A918B03
    Filesize

    406B

    MD5

    c8eed800e9c5782508e3c75675df53e3

    SHA1

    fd789fba0a1f71906a20a4fd291e8b571eddbef1

    SHA256

    03e7003a312d1c2493e3f6a7c56532b690b977e555e636a359d0f005eee37766

    SHA512

    b4461a3ae67551aff9ca44132e5a320b3dbec4f50d55d1a42eb266d1601b1bb62fa8d636d3877c3b93c9eab319db09b9a2b73211c8bae854c563118a31165d96

  • C:\Users\Admin\AppData\Local\Temp\CabDEAC.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\nsz6950.tmp\System.dll
    Filesize

    11KB

    MD5

    b0c77267f13b2f87c084fd86ef51ccfc

    SHA1

    f7543f9e9b4f04386dfbf33c38cbed1bf205afb3

    SHA256

    a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77

    SHA512

    f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e

  • C:\Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • C:\Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • C:\Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • C:\Users\Admin\Doliolidae\Flugtskydninger\Privatvejens\Haandfuldenes\Impregnating\Kontaktcentrenes.Fla
    Filesize

    236KB

    MD5

    b7d956e078c957cb5360c4ea2d3c2273

    SHA1

    c628a326cf84d3dae3554e68fda7a3ea00a1b92f

    SHA256

    ff47cd620bf8e3272e23989d45344b155305fe012786d5cd36daae86e437fdf1

    SHA512

    c0a8f0d04295f810988e4cef08ee036326f1fc2247d2c35480fd9d019e0014f6a96ed07c0bf299fe230cb1f107f83c32bde8c04ae7445c6aa6eff881ae9f10f8

  • C:\Users\Admin\Doliolidae\Flugtskydninger\Privatvejens\Haandfuldenes\Impregnating\Superprecise.Jum
    Filesize

    89KB

    MD5

    951a26dcadeac34af41bc733cec364c1

    SHA1

    113d2cd326d79e26f9df13f1637b1d62de5e68b7

    SHA256

    a3bc552ffe558a34a32cce7e4cb9b90d36ec8971f29d408ef9ed2f519a60525c

    SHA512

    2d6987fbf99db85ccc7c5a6f3fa87f003d982ba06d5ba5e5e79f1f797399fa283cc3790483e9acb62a2e744c2accab433c26234e341ec0f9797d74d2fcfed378

  • \Users\Admin\AppData\Local\Temp\nsj1844.tmp\System.dll
    Filesize

    11KB

    MD5

    b0c77267f13b2f87c084fd86ef51ccfc

    SHA1

    f7543f9e9b4f04386dfbf33c38cbed1bf205afb3

    SHA256

    a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77

    SHA512

    f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e

  • \Users\Admin\AppData\Local\Temp\nsz6950.tmp\System.dll
    Filesize

    11KB

    MD5

    b0c77267f13b2f87c084fd86ef51ccfc

    SHA1

    f7543f9e9b4f04386dfbf33c38cbed1bf205afb3

    SHA256

    a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77

    SHA512

    f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e

  • \Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • memory/376-139-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/376-163-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/376-161-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/376-160-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/376-157-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/376-140-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/524-78-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/524-79-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/524-125-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/524-107-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/524-106-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/524-105-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/524-102-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/524-77-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/524-127-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1208-76-0x0000000003080000-0x0000000003FAF000-memory.dmp
    Filesize

    15.2MB

  • memory/1208-75-0x0000000003080000-0x0000000003FAF000-memory.dmp
    Filesize

    15.2MB

  • memory/1728-118-0x0000000001CB0000-0x0000000001CF0000-memory.dmp
    Filesize

    256KB

  • memory/1728-119-0x0000000001CB0000-0x0000000001CF0000-memory.dmp
    Filesize

    256KB

  • memory/1728-117-0x0000000001CB0000-0x0000000001CF0000-memory.dmp
    Filesize

    256KB

  • memory/2020-137-0x0000000003000000-0x0000000003F2F000-memory.dmp
    Filesize

    15.2MB

  • memory/2020-136-0x0000000003000000-0x0000000003F2F000-memory.dmp
    Filesize

    15.2MB