Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/06/2023, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
403KB
-
MD5
fed4e5c5a6289646dbfeaf2a6ac1837d
-
SHA1
7e26ff3f359cce161296f051be5d9e5347185cca
-
SHA256
ca3affd71eef006c116efd75c7a5b44e1d4af1749dc14f24a103f21d22190af5
-
SHA512
02e94a04a5e95e785c07099f5cafd5b47924b6f60b103a6d7a2c1059f0e7d73c0a5cb77cfb4fd2fcaf8fa4791a8eeea6cc8aabe52ecf3ce45e811b76c548b6e4
-
SSDEEP
6144:fjNyCpEwbIE8BFbkP7OTcpdW4RluwlbUgSoGfMBhm6NXNiqYzOvFbt:1EwbIE8HAP7PW4jFlwFfUhm6NMqYz8H
Malware Config
Extracted
warzonerat
91.193.75.154:4449
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions file.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe -
Warzone RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1668-78-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools file.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
Executes dropped EXE 1 IoCs
pid Process 580 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1420 cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" file.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum file.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 580 set thread context of 1668 580 svchost.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1180 1668 WerFault.exe 45 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 552 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 832 timeout.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1764 file.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 580 svchost.exe 936 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 580 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1764 file.exe Token: SeDebugPrivilege 580 svchost.exe Token: SeDebugPrivilege 580 svchost.exe Token: SeLoadDriverPrivilege 580 svchost.exe Token: SeDebugPrivilege 936 powershell.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1916 1764 file.exe 29 PID 1764 wrote to memory of 1916 1764 file.exe 29 PID 1764 wrote to memory of 1916 1764 file.exe 29 PID 1764 wrote to memory of 1420 1764 file.exe 31 PID 1764 wrote to memory of 1420 1764 file.exe 31 PID 1764 wrote to memory of 1420 1764 file.exe 31 PID 1916 wrote to memory of 552 1916 cmd.exe 33 PID 1916 wrote to memory of 552 1916 cmd.exe 33 PID 1916 wrote to memory of 552 1916 cmd.exe 33 PID 1420 wrote to memory of 832 1420 cmd.exe 34 PID 1420 wrote to memory of 832 1420 cmd.exe 34 PID 1420 wrote to memory of 832 1420 cmd.exe 34 PID 1420 wrote to memory of 580 1420 cmd.exe 35 PID 1420 wrote to memory of 580 1420 cmd.exe 35 PID 1420 wrote to memory of 580 1420 cmd.exe 35 PID 580 wrote to memory of 936 580 svchost.exe 36 PID 580 wrote to memory of 936 580 svchost.exe 36 PID 580 wrote to memory of 936 580 svchost.exe 36 PID 580 wrote to memory of 980 580 svchost.exe 38 PID 580 wrote to memory of 980 580 svchost.exe 38 PID 580 wrote to memory of 980 580 svchost.exe 38 PID 580 wrote to memory of 1500 580 svchost.exe 39 PID 580 wrote to memory of 1500 580 svchost.exe 39 PID 580 wrote to memory of 1500 580 svchost.exe 39 PID 580 wrote to memory of 1928 580 svchost.exe 40 PID 580 wrote to memory of 1928 580 svchost.exe 40 PID 580 wrote to memory of 1928 580 svchost.exe 40 PID 580 wrote to memory of 1544 580 svchost.exe 41 PID 580 wrote to memory of 1544 580 svchost.exe 41 PID 580 wrote to memory of 1544 580 svchost.exe 41 PID 580 wrote to memory of 988 580 svchost.exe 42 PID 580 wrote to memory of 988 580 svchost.exe 42 PID 580 wrote to memory of 988 580 svchost.exe 42 PID 580 wrote to memory of 836 580 svchost.exe 43 PID 580 wrote to memory of 836 580 svchost.exe 43 PID 580 wrote to memory of 836 580 svchost.exe 43 PID 580 wrote to memory of 1652 580 svchost.exe 44 PID 580 wrote to memory of 1652 580 svchost.exe 44 PID 580 wrote to memory of 1652 580 svchost.exe 44 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 580 wrote to memory of 1668 580 svchost.exe 45 PID 1668 wrote to memory of 1180 1668 Setup.exe 46 PID 1668 wrote to memory of 1180 1668 Setup.exe 46 PID 1668 wrote to memory of 1180 1668 Setup.exe 46 PID 1668 wrote to memory of 1180 1668 Setup.exe 46 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:552
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp723.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:832
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regtlibv12.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regtlibv12.exe"4⤵PID:980
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"4⤵PID:1500
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:1928
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"4⤵PID:1544
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"4⤵PID:988
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"4⤵PID:836
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"4⤵PID:1652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\Setup.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\Setup.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 3045⤵
- Program crash
PID:1180
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Defense Evasion
Bypass User Account Control
1Disabling Security Tools
1Modify Registry
4Scripting
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD54521243bc4bbb82b9361bffd9a908233
SHA152391915a177cd3c828b9758023d5f041ac26934
SHA256b82dc771857cbf8d9535ddf52bf13cbd55b097a10962f6852d74928b63298a94
SHA512861ddf1e072376ef82600656f6a9fd0fe8236597c4ebba88f1cb24e050014c76978d7f1f1430b54b61c5bead4b6ea449e9931163c49e53b88189f8884fe6c182
-
Filesize
150B
MD54521243bc4bbb82b9361bffd9a908233
SHA152391915a177cd3c828b9758023d5f041ac26934
SHA256b82dc771857cbf8d9535ddf52bf13cbd55b097a10962f6852d74928b63298a94
SHA512861ddf1e072376ef82600656f6a9fd0fe8236597c4ebba88f1cb24e050014c76978d7f1f1430b54b61c5bead4b6ea449e9931163c49e53b88189f8884fe6c182
-
Filesize
403KB
MD5fed4e5c5a6289646dbfeaf2a6ac1837d
SHA17e26ff3f359cce161296f051be5d9e5347185cca
SHA256ca3affd71eef006c116efd75c7a5b44e1d4af1749dc14f24a103f21d22190af5
SHA51202e94a04a5e95e785c07099f5cafd5b47924b6f60b103a6d7a2c1059f0e7d73c0a5cb77cfb4fd2fcaf8fa4791a8eeea6cc8aabe52ecf3ce45e811b76c548b6e4
-
Filesize
403KB
MD5fed4e5c5a6289646dbfeaf2a6ac1837d
SHA17e26ff3f359cce161296f051be5d9e5347185cca
SHA256ca3affd71eef006c116efd75c7a5b44e1d4af1749dc14f24a103f21d22190af5
SHA51202e94a04a5e95e785c07099f5cafd5b47924b6f60b103a6d7a2c1059f0e7d73c0a5cb77cfb4fd2fcaf8fa4791a8eeea6cc8aabe52ecf3ce45e811b76c548b6e4
-
Filesize
403KB
MD5fed4e5c5a6289646dbfeaf2a6ac1837d
SHA17e26ff3f359cce161296f051be5d9e5347185cca
SHA256ca3affd71eef006c116efd75c7a5b44e1d4af1749dc14f24a103f21d22190af5
SHA51202e94a04a5e95e785c07099f5cafd5b47924b6f60b103a6d7a2c1059f0e7d73c0a5cb77cfb4fd2fcaf8fa4791a8eeea6cc8aabe52ecf3ce45e811b76c548b6e4