Analysis

  • max time kernel
    123s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2023 05:30

General

  • Target

    canscaner.exe

  • Size

    359KB

  • MD5

    1e121f211154ea35481f600f70ff4896

  • SHA1

    fc5cd57e6105e1b3b65d13ae01833e4df3a8ce69

  • SHA256

    9733cb0728ddfe72f5ebcaeda6f7898e1902d51173bf8bf370be319f103a616f

  • SHA512

    823b3c1e2505bb6f34bd324e2540857874a4899ac0c8e80d55eebab2d80f9dac1ce71668adb435551c3a31bdbd12fa997cd93e290e88b51a19cd014c560098c3

  • SSDEEP

    3072:h9TNwme7IkrAsypLIDyimbNWo/KwlppAX/JhkF/yASHAMGzl2fcU+FguHDYdX+pU:Wme7WPpL6mbNWo3lYMFzSHxlQYKNt

Malware Config

Extracted

Family

warzonerat

C2

esserc.ooguy.com:2822

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 7 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\canscaner.exe
    "C:\Users\Admin\AppData\Local\Temp\canscaner.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\fhfhfhf.exe,"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4552
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\fhfhfhf.exe,"
        3⤵
        • Modifies WinLogon for persistence
        PID:384
    • C:\Users\Admin\AppData\Roaming\fhfhfhf.exe
      "C:\Users\Admin\AppData\Roaming\fhfhfhf.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
        3⤵
          PID:1816
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          3⤵
          • Sets DLL path for service in the registry
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1784
          • C:\Users\Admin\AppData\Local\Temp\9.exe
            "C:\Users\Admin\AppData\Local\Temp\9.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4596
            • C:\Windows\SysWOW64\netsh.exe
              netsh advfirewall firewall add rule name="3389" dir=in action=allow protocol=TCP localport=3389
              5⤵
              • Modifies Windows Firewall
              PID:3568
        • C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.exe
          "C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:692
          • C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.exe
            "C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2388
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -s TermService
      1⤵
        PID:3768
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k NetworkService -s TermService
        1⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3972

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Microsoft DN1\sqlmap.dll

        Filesize

        114KB

        MD5

        461ade40b800ae80a40985594e1ac236

        SHA1

        b3892eef846c044a2b0785d54a432b3e93a968c8

        SHA256

        798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4

        SHA512

        421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fhfhfhffgbfbv.exe.log

        Filesize

        1KB

        MD5

        7dca233df92b3884663fa5a40db8d49c

        SHA1

        208b8f27b708c4e06ac37f974471cc7b29c29b60

        SHA256

        90c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c

        SHA512

        d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07

      • C:\Users\Admin\AppData\Local\Temp\9.exe

        Filesize

        70KB

        MD5

        ca96229390a0e6a53e8f2125f2c01114

        SHA1

        a54b1081cf58724f8cb292b4d165dfee2fb1c9f6

        SHA256

        0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c

        SHA512

        e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef

      • C:\Users\Admin\AppData\Local\Temp\9.exe

        Filesize

        70KB

        MD5

        ca96229390a0e6a53e8f2125f2c01114

        SHA1

        a54b1081cf58724f8cb292b4d165dfee2fb1c9f6

        SHA256

        0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c

        SHA512

        e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef

      • C:\Users\Admin\AppData\Local\Temp\9.exe

        Filesize

        70KB

        MD5

        ca96229390a0e6a53e8f2125f2c01114

        SHA1

        a54b1081cf58724f8cb292b4d165dfee2fb1c9f6

        SHA256

        0df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c

        SHA512

        e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef

      • C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.exe

        Filesize

        76KB

        MD5

        0e362e7005823d0bec3719b902ed6d62

        SHA1

        590d860b909804349e0cdc2f1662b37bd62f7463

        SHA256

        2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

        SHA512

        518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

      • C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.exe

        Filesize

        76KB

        MD5

        0e362e7005823d0bec3719b902ed6d62

        SHA1

        590d860b909804349e0cdc2f1662b37bd62f7463

        SHA256

        2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

        SHA512

        518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

      • C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.exe

        Filesize

        76KB

        MD5

        0e362e7005823d0bec3719b902ed6d62

        SHA1

        590d860b909804349e0cdc2f1662b37bd62f7463

        SHA256

        2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

        SHA512

        518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

      • C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.exe

        Filesize

        76KB

        MD5

        0e362e7005823d0bec3719b902ed6d62

        SHA1

        590d860b909804349e0cdc2f1662b37bd62f7463

        SHA256

        2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

        SHA512

        518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

      • C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.txt

        Filesize

        55B

        MD5

        3f94a28fb35da4ac0d3a7c132a3aadb2

        SHA1

        a9876451c87115c8cbec8bf8dcab65d728ac1db4

        SHA256

        6cfe3daac56adfeb14d118977511176c7c47600c11f67991fbefc21afd1bfa72

        SHA512

        8bad152c41b3604b83e0b0ae5b1db8f11d09b6a74b3ce763737433778073278febb2e4cce99982caad4fa838c86054b475c023d0e9a723bf36795ee49d06c254

      • C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.txt

        Filesize

        56B

        MD5

        9126722ab6dd9931de8f45f2b22b65fa

        SHA1

        6d2c75e72a529c8d9e03f916b0fb44f929a2b5c0

        SHA256

        ac15edc2f75b4332205fe0bdbcfcc349012b7859014c85f8a971a5d13bbc8c58

        SHA512

        a9d8345c90de3a5b58a00a6aaa6c9db25c7b37c4c9da2ffd599c00399ce7bb9487b823df98df8d4561fd37f38b16ef2e158e2bf33b7bcae8adfea8552d57a162

      • C:\Users\Admin\AppData\Local\Temp\fhfhfhffgbfbv.txt

        Filesize

        56B

        MD5

        9126722ab6dd9931de8f45f2b22b65fa

        SHA1

        6d2c75e72a529c8d9e03f916b0fb44f929a2b5c0

        SHA256

        ac15edc2f75b4332205fe0bdbcfcc349012b7859014c85f8a971a5d13bbc8c58

        SHA512

        a9d8345c90de3a5b58a00a6aaa6c9db25c7b37c4c9da2ffd599c00399ce7bb9487b823df98df8d4561fd37f38b16ef2e158e2bf33b7bcae8adfea8552d57a162

      • C:\Users\Admin\AppData\Roaming\fhfhfhf.exe

        Filesize

        359KB

        MD5

        1e121f211154ea35481f600f70ff4896

        SHA1

        fc5cd57e6105e1b3b65d13ae01833e4df3a8ce69

        SHA256

        9733cb0728ddfe72f5ebcaeda6f7898e1902d51173bf8bf370be319f103a616f

        SHA512

        823b3c1e2505bb6f34bd324e2540857874a4899ac0c8e80d55eebab2d80f9dac1ce71668adb435551c3a31bdbd12fa997cd93e290e88b51a19cd014c560098c3

      • C:\Users\Admin\AppData\Roaming\fhfhfhf.exe

        Filesize

        359KB

        MD5

        1e121f211154ea35481f600f70ff4896

        SHA1

        fc5cd57e6105e1b3b65d13ae01833e4df3a8ce69

        SHA256

        9733cb0728ddfe72f5ebcaeda6f7898e1902d51173bf8bf370be319f103a616f

        SHA512

        823b3c1e2505bb6f34bd324e2540857874a4899ac0c8e80d55eebab2d80f9dac1ce71668adb435551c3a31bdbd12fa997cd93e290e88b51a19cd014c560098c3

      • C:\Users\Admin\AppData\Roaming\fhfhfhf.exe

        Filesize

        359KB

        MD5

        1e121f211154ea35481f600f70ff4896

        SHA1

        fc5cd57e6105e1b3b65d13ae01833e4df3a8ce69

        SHA256

        9733cb0728ddfe72f5ebcaeda6f7898e1902d51173bf8bf370be319f103a616f

        SHA512

        823b3c1e2505bb6f34bd324e2540857874a4899ac0c8e80d55eebab2d80f9dac1ce71668adb435551c3a31bdbd12fa997cd93e290e88b51a19cd014c560098c3

      • \??\c:\program files\microsoft dn1\rdpwrap.ini

        Filesize

        321KB

        MD5

        5c2160799c3fc664c83bbc9958eede94

        SHA1

        7d39f7d2fb2a302779a28efd0f1c85589cfef066

        SHA256

        d91ae65f689c4f70b27de6941f81e9b1600447a920162a3e69ad734bac62ecd5

        SHA512

        681d697f1a79baa6892e1a8da03ca9b63d118cbc587784db9ed4664e49e10731b9ab0d6e0379fd65325ae586f7afb2a2f839f8c3a8ec9ebdbe1a045a26f229df

      • \??\c:\program files\microsoft dn1\sqlmap.dll

        Filesize

        114KB

        MD5

        461ade40b800ae80a40985594e1ac236

        SHA1

        b3892eef846c044a2b0785d54a432b3e93a968c8

        SHA256

        798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4

        SHA512

        421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26

      • memory/692-200-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/692-177-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/692-176-0x0000000000CF0000-0x0000000000D0A000-memory.dmp

        Filesize

        104KB

      • memory/1784-182-0x0000000000400000-0x000000000055C000-memory.dmp

        Filesize

        1.4MB

      • memory/1784-164-0x0000000000400000-0x000000000055C000-memory.dmp

        Filesize

        1.4MB

      • memory/1784-212-0x0000000000400000-0x000000000055C000-memory.dmp

        Filesize

        1.4MB

      • memory/1784-160-0x0000000000400000-0x000000000055C000-memory.dmp

        Filesize

        1.4MB

      • memory/1784-178-0x0000000000400000-0x000000000055C000-memory.dmp

        Filesize

        1.4MB

      • memory/1784-208-0x0000000000400000-0x000000000055C000-memory.dmp

        Filesize

        1.4MB

      • memory/1784-165-0x0000000000400000-0x000000000055C000-memory.dmp

        Filesize

        1.4MB

      • memory/2388-209-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/2388-201-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/4596-195-0x0000000000DA0000-0x0000000000DCD000-memory.dmp

        Filesize

        180KB

      • memory/4596-211-0x0000000000DA0000-0x0000000000DCD000-memory.dmp

        Filesize

        180KB

      • memory/4732-137-0x00000000058E0000-0x000000000597C000-memory.dmp

        Filesize

        624KB

      • memory/4732-134-0x0000000000E50000-0x0000000000EB0000-memory.dmp

        Filesize

        384KB

      • memory/4732-139-0x0000000005800000-0x000000000580A000-memory.dmp

        Filesize

        40KB

      • memory/4732-136-0x0000000005840000-0x00000000058D2000-memory.dmp

        Filesize

        584KB

      • memory/4732-135-0x0000000005DF0000-0x0000000006394000-memory.dmp

        Filesize

        5.6MB

      • memory/4732-133-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/4732-142-0x0000000005AE0000-0x0000000005AF0000-memory.dmp

        Filesize

        64KB

      • memory/4732-141-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/4732-156-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/4732-138-0x0000000005AE0000-0x0000000005AF0000-memory.dmp

        Filesize

        64KB

      • memory/5108-154-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/5108-155-0x0000000000880000-0x00000000008E0000-memory.dmp

        Filesize

        384KB

      • memory/5108-207-0x0000000005500000-0x0000000005510000-memory.dmp

        Filesize

        64KB

      • memory/5108-158-0x0000000074B60000-0x0000000075310000-memory.dmp

        Filesize

        7.7MB

      • memory/5108-159-0x0000000005500000-0x0000000005510000-memory.dmp

        Filesize

        64KB

      • memory/5108-157-0x0000000005500000-0x0000000005510000-memory.dmp

        Filesize

        64KB

      • memory/5108-163-0x0000000005500000-0x0000000005510000-memory.dmp

        Filesize

        64KB