Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2023 05:37

General

  • Target

    order confirmation reference no. FXEPS6S100523 .exe

  • Size

    804KB

  • MD5

    abc22566e1c69dc36e74310dedf0ba9d

  • SHA1

    e79b1e5426cb99f868722639b954388db77786ff

  • SHA256

    f6e135f152463447adc3db1b0de4534d762e21699b17fea4fc66cd2dbf937345

  • SHA512

    99d4d313a4c47603f56c62c9d5924adae04df8945feb6b7b6cccdf7076552c2903a5fce214d15cc354bcdd547c43a52fa373b4b3fbdba0703d52dbfdb69be770

  • SSDEEP

    12288:0u+e4v0ma0dwwcQNHRh+ZXiwBdbPmWvy5dHnlllllllllllllllllllllllllll7:0uRQq0iwcmhEffeWKnzhxN2rn4P9h

Malware Config

Extracted

Family

warzonerat

C2

nightmare4666.ddns.net:3443

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • ModiLoader Second Stage 1 IoCs
  • Warzone RAT payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\order confirmation reference no. FXEPS6S100523 .exe
    "C:\Users\Admin\AppData\Local\Temp\order confirmation reference no. FXEPS6S100523 .exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Public\Libraries\tkghmwvN.pif
      C:\Users\Public\Libraries\tkghmwvN.pif
      2⤵
      • Executes dropped EXE
      PID:2420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Libraries\tkghmwvN.pif

    Filesize

    66KB

    MD5

    c116d3604ceafe7057d77ff27552c215

    SHA1

    452b14432fb5758b46f2897aeccd89f7c82a727d

    SHA256

    7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301

    SHA512

    9202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6

  • C:\Users\Public\Libraries\tkghmwvN.pif

    Filesize

    66KB

    MD5

    c116d3604ceafe7057d77ff27552c215

    SHA1

    452b14432fb5758b46f2897aeccd89f7c82a727d

    SHA256

    7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301

    SHA512

    9202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6

  • memory/2420-150-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/2420-155-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/2420-156-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/2420-157-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/2420-158-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/2924-133-0x00000000040A0000-0x00000000040DE000-memory.dmp

    Filesize

    248KB

  • memory/2924-135-0x00000000006C0000-0x00000000006C1000-memory.dmp

    Filesize

    4KB

  • memory/2924-136-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB