Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2023 13:26

General

  • Target

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f.exe

  • Size

    267KB

  • MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

  • SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

  • SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

  • SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • SSDEEP

    6144:GDOmbbC0309OSXjr2Z2UCEVSOuzAtf/QZv3z9jnnOldiUf:4bZ309//2HCEVNuzaf/QZvj1nki

Malware Config

Extracted

Family

warzonerat

C2

dnmpbczm0963fxtdplc.duckdns.org:5689

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 6 IoCs
  • Checks QEMU agent file 2 TTPs 4 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f.exe
    "C:\Users\Admin\AppData\Local\Temp\3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f.exe
      "C:\Users\Admin\AppData\Local\Temp\3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f.exe"
      2⤵
      • Checks QEMU agent file
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:1316
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Add-MpPreference -ExclusionPath C:\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1796
      • C:\Users\Admin\Documents\Windows.exe
        "C:\Users\Admin\Documents\Windows.exe"
        3⤵
        • Checks QEMU agent file
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Users\Admin\Documents\Windows.exe
          "C:\Users\Admin\Documents\Windows.exe"
          4⤵
          • Checks QEMU agent file
          • Loads dropped DLL
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:540

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    1KB

    MD5

    099029cc3241cd150610dd58a0c87946

    SHA1

    3d95a916f5a5293e2423b88c34055fadb41d1b89

    SHA256

    13217fd2a1dc536954e659dbe543ad7a73c2038ae0e2fb965ba3571ecf018763

    SHA512

    1820b30903570de0b8b37d3d04cc3261224ce62fb1bb47bda9f250c78ec2abb20208ee15f262743222adb25e7854dee1fde952179aa180d43875d95117462b0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    Filesize

    724B

    MD5

    f569e1d183b84e8078dc456192127536

    SHA1

    30c537463eed902925300dd07a87d820a713753f

    SHA256

    287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

    SHA512

    49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_5F17CB88D912DC7F39DB9F2FB36C0D37
    Filesize

    472B

    MD5

    7192531b5ad082b63c067aa5932ec07b

    SHA1

    1275d7db171b6e336bd755408ae452afa60f48dd

    SHA256

    286c0269d72bdc72ae9c52360e8ec2623b2f728f01289b41a206881caf644361

    SHA512

    33e90276e63e94c80151a39771c5d1386154d44d042a8246180139368f29519f05a072f41508b64f63ea85c87d5bce7b55c76c9a341c60499801cb6c080edd95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_946BD0A8459296E531C25E347ABFB609
    Filesize

    472B

    MD5

    bfa45bb31acdcad04104ab759ca396b0

    SHA1

    f8290df5a249f0dd192fec38584618205b2d4bc7

    SHA256

    97b4f123c07d8ccbbb7f6757f55e2b2b055ea296a29f52a729efdc996e9c8592

    SHA512

    0a6c6c11a02b2cb91ee67908aa3d8732949d1a9b3d8320a7c6e513f5eba334f88d5be1e57fd6788ae14c69c8c01246c18d9f710f180cb9a0b6ac227e308da626

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
    Filesize

    410B

    MD5

    d598883a288d8c3c34048d9fabb1164a

    SHA1

    6d06102b66d56aa3b571f08c71694a98d20afd94

    SHA256

    80b52391b0b44936d112688d943a0b51d318031a91ffd3452e265326f819e886

    SHA512

    f2dcfcdb63aee7b530a0757dffa54c235637314f330180c8338bd69e54194e06c68a0dac86420440a0d0389fc68aa87e8de90cd6480fbd2955d0499d935ab217

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b5968566148a0d87cd8261998937df7f

    SHA1

    481e93c56d61c49099bc0850db161e4802b4f3da

    SHA256

    cd93671f8e71aeacad698168d9da26323c32a5a4ac03ab34a93a31547638a265

    SHA512

    e0331a7f55059f6e0c20826b5d805ae31fc30db373c71ec81acbb34af2b5065119caa9c06a2010ed99d998a984785045ab4cad6c28c0b2fb189a864865cc9107

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
    Filesize

    392B

    MD5

    c0d81786939a1974a8f0c3b7e1f628f9

    SHA1

    366aeb9a415f726db72d4cd5b1e89c84b65c93b6

    SHA256

    8ac9c0f4946d02f3a81aea998630091830ce36b988364683d648cd9273758242

    SHA512

    8011b5c2ebade71986524f375432272a7f1947ec95c11515a56cbe1ebe289602c4cb67770be00a9b5eb67e167c1bafbc3142944c7a1ba2765208a6fcf5cd20e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_5F17CB88D912DC7F39DB9F2FB36C0D37
    Filesize

    406B

    MD5

    25f984e8d4ea8cad14d497765f34b32c

    SHA1

    26b3ea9b36fdca311a0761d8f10e843d96125955

    SHA256

    261f985b50e3ab5ac33b4ba5b4954f024baa307d2f28e78161c4d62a26ff154c

    SHA512

    1beb89dae01130d94fabc294017197f5616bedff43c3cdb972ded16a946d97520c11e28d727434566ef27f9baca97cd13757117db74ba00fa0ced8fb78aad99e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_946BD0A8459296E531C25E347ABFB609
    Filesize

    402B

    MD5

    e94074388c742b46eaebbc318ccde4f2

    SHA1

    d3940669b6d6aa36a29b9b7692385b9a812ad667

    SHA256

    2ccd71ab8765c7e0d72db5517811193bc1edba5a5dc7990b7f1e648ab5ab34a6

    SHA512

    c0736e06f7017db945a1b2c7cec241adfd1406458906508875f6f7be88dea0ea580fa1e18ecb58b96d509a4f939731b1c6441fa317c471724d4c1eed3a0daf5f

  • C:\Users\Admin\AppData\Local\Temp\CabEE17.tmp
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\nse6C2D.tmp\System.dll
    Filesize

    11KB

    MD5

    b0c77267f13b2f87c084fd86ef51ccfc

    SHA1

    f7543f9e9b4f04386dfbf33c38cbed1bf205afb3

    SHA256

    a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77

    SHA512

    f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e

  • C:\Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • C:\Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • C:\Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • C:\Users\Admin\Doliolidae\Flugtskydninger\Privatvejens\Haandfuldenes\Impregnating\Kontaktcentrenes.Fla
    Filesize

    236KB

    MD5

    b7d956e078c957cb5360c4ea2d3c2273

    SHA1

    c628a326cf84d3dae3554e68fda7a3ea00a1b92f

    SHA256

    ff47cd620bf8e3272e23989d45344b155305fe012786d5cd36daae86e437fdf1

    SHA512

    c0a8f0d04295f810988e4cef08ee036326f1fc2247d2c35480fd9d019e0014f6a96ed07c0bf299fe230cb1f107f83c32bde8c04ae7445c6aa6eff881ae9f10f8

  • C:\Users\Admin\Doliolidae\Flugtskydninger\Privatvejens\Haandfuldenes\Impregnating\Superprecise.Jum
    Filesize

    89KB

    MD5

    951a26dcadeac34af41bc733cec364c1

    SHA1

    113d2cd326d79e26f9df13f1637b1d62de5e68b7

    SHA256

    a3bc552ffe558a34a32cce7e4cb9b90d36ec8971f29d408ef9ed2f519a60525c

    SHA512

    2d6987fbf99db85ccc7c5a6f3fa87f003d982ba06d5ba5e5e79f1f797399fa283cc3790483e9acb62a2e744c2accab433c26234e341ec0f9797d74d2fcfed378

  • \Users\Admin\AppData\Local\Temp\nse6C2D.tmp\System.dll
    Filesize

    11KB

    MD5

    b0c77267f13b2f87c084fd86ef51ccfc

    SHA1

    f7543f9e9b4f04386dfbf33c38cbed1bf205afb3

    SHA256

    a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77

    SHA512

    f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e

  • \Users\Admin\AppData\Local\Temp\nst2242.tmp\System.dll
    Filesize

    11KB

    MD5

    b0c77267f13b2f87c084fd86ef51ccfc

    SHA1

    f7543f9e9b4f04386dfbf33c38cbed1bf205afb3

    SHA256

    a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77

    SHA512

    f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e

  • \Users\Admin\Documents\Windows.exe
    Filesize

    267KB

    MD5

    4dbe71a4ca0eaea634ec73b4a82d32a9

    SHA1

    48ba9c1be52988de95bf1a2597fd573f96892895

    SHA256

    3abea4ab1fa4c8497722e9b58c5981fbc90fefe5a1d0bda707bdabfe3c1bdb1f

    SHA512

    5f157e987b2c2b25a2d66e49dcc583220da474bd8756b6ea8d206ebeb99e994a02f98800a081a750b885b576f20204b89b8632de956bf0d8cec9d5785c6fcd70

  • memory/540-139-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/540-164-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/540-162-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/540-161-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/540-158-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/540-138-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1316-78-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/1316-125-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1316-107-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1316-106-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/1316-105-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/1316-102-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1316-79-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1316-124-0x0000000001470000-0x000000000239F000-memory.dmp
    Filesize

    15.2MB

  • memory/1316-77-0x0000000000400000-0x0000000001462000-memory.dmp
    Filesize

    16.4MB

  • memory/1688-136-0x00000000030B0000-0x0000000003FDF000-memory.dmp
    Filesize

    15.2MB

  • memory/1688-135-0x00000000030B0000-0x0000000003FDF000-memory.dmp
    Filesize

    15.2MB

  • memory/1796-118-0x0000000002570000-0x00000000025B0000-memory.dmp
    Filesize

    256KB

  • memory/1796-117-0x0000000002570000-0x00000000025B0000-memory.dmp
    Filesize

    256KB

  • memory/2044-76-0x0000000002F00000-0x0000000003E2F000-memory.dmp
    Filesize

    15.2MB

  • memory/2044-75-0x0000000002F00000-0x0000000003E2F000-memory.dmp
    Filesize

    15.2MB