Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2023 12:59

General

  • Target

    Re Porforma Invoice 60 downpayment - PT Era F1909003 Project Kupang.exe

  • Size

    718KB

  • MD5

    eae3bd76ec42b738462cb746206550bc

  • SHA1

    8f071fc96b3f464cd1fa1c63624c4e62270e22dc

  • SHA256

    969af9f6016a316693a0d710460a4b6576185a2907c999985f2642ef26889584

  • SHA512

    990a88710a4484bcc6b0c121a2089de282298d6f7bee46d2676a19658bc9ce1d5fd2fee3112aa7db2553ed39ddc80d1a28800665a2270462ea2316666d28c65f

  • SSDEEP

    12288:v5l9W77bOltPah+3EwFE4303gWWAAT6JlK0Xh:vHcOAIy2T6FXh

Malware Config

Extracted

Family

warzonerat

C2

nightmare4666.ddns.net:3443

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • ModiLoader Second Stage 1 IoCs
  • Warzone RAT payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Re Porforma Invoice 60 downpayment - PT Era F1909003 Project Kupang.exe
    "C:\Users\Admin\AppData\Local\Temp\Re Porforma Invoice 60 downpayment - PT Era F1909003 Project Kupang.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Users\Public\Libraries\tkghmwvN.pif
      C:\Users\Public\Libraries\tkghmwvN.pif
      2⤵
      • Executes dropped EXE
      PID:2240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Libraries\tkghmwvN.pif

    Filesize

    171KB

    MD5

    22331abcc9472cc9dc6f37faf333aa2c

    SHA1

    2a001c30ba79a19ceaf6a09c3567c70311760aa4

    SHA256

    bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

    SHA512

    c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

  • C:\Users\Public\Libraries\tkghmwvN.pif

    Filesize

    171KB

    MD5

    22331abcc9472cc9dc6f37faf333aa2c

    SHA1

    2a001c30ba79a19ceaf6a09c3567c70311760aa4

    SHA256

    bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

    SHA512

    c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

  • memory/2240-149-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/2240-154-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/2240-155-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/2240-156-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/2240-157-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/4680-133-0x00000000023C0000-0x00000000023EC000-memory.dmp

    Filesize

    176KB

  • memory/4680-135-0x00000000007B0000-0x00000000007B1000-memory.dmp

    Filesize

    4KB

  • memory/4680-136-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB