Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
WarCrypter/WarCrypter.exe
Resource
win10v2004-20231215-en
General
-
Target
WarCrypter/WarCrypter.exe
-
Size
1.0MB
-
MD5
5172e42a4c37c324d1bbde19e2523614
-
SHA1
82ad13fa0fa289de0bc39f769ed7aff26fb5c149
-
SHA256
d53fa4cccfb68404f07949fa67b230697b2f3e2acec6535d8ce74ed397ef05c6
-
SHA512
aadf26baf1e735c55a8fe3cfe68e9053968bc529b1c4b4a70a4441e5cf85d32ed916b5934de5c312d5896d1fab37712e026a8485fe91226428e77d5fbd670697
-
SSDEEP
24576:3+kh6t3UREOdw3pDhmuU1ITWxLi68+fEo6VDjZCUB:3KMdwZ1mqH+SVHDB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation WarCrypter.exe -
Executes dropped EXE 3 IoCs
pid Process 4760 build.exe 4444 WarCrypter.exe 3496 module.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\module = "C:\\ProgramData\\module.exe" build.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4444 WarCrypter.exe Token: 33 728 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 728 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4444 WarCrypter.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4120 wrote to memory of 4760 4120 WarCrypter.exe 84 PID 4120 wrote to memory of 4760 4120 WarCrypter.exe 84 PID 4120 wrote to memory of 4444 4120 WarCrypter.exe 85 PID 4120 wrote to memory of 4444 4120 WarCrypter.exe 85 PID 4120 wrote to memory of 4444 4120 WarCrypter.exe 85 PID 4760 wrote to memory of 3496 4760 build.exe 86 PID 4760 wrote to memory of 3496 4760 build.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\WarCrypter\WarCrypter.exe"C:\Users\Admin\AppData\Local\Temp\WarCrypter\WarCrypter.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\ProgramData\module.exeC:\ProgramData\module.exe3⤵
- Executes dropped EXE
PID:3496
-
-
-
C:\Users\Admin\AppData\Local\Temp\WarCrypter.exe"C:\Users\Admin\AppData\Local\Temp\WarCrypter.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4444
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
447KB
MD509475620b2afe5f8ebd677cf669e055d
SHA1b23ca6010b25304fc10cc47c79c12655988e207f
SHA256db3f6147d0b91063e017783c8913c12af54238429209feb2d5e01823e1a56a59
SHA512aab79e3359c39f5d9695387c41aba86170c7cb1162db9270d52e8f957295dc6b484b6da9d805c18343430c6e6d858c6993f2db849be4e7fd3ce37471ef9c5880
-
Filesize
904KB
MD57aaddd342305fab1f267243390a2d924
SHA1dee646017cd31840bde7fcdffb5b487a1361d5d0
SHA25624c71405384ad6a5c2c85b339b4aba3ab2914b5dfcab0c707861731b1d4ba66f
SHA512ed7553264ba720809a3bb39ca556a1f3c21f9d3f2270f9a481986c9aa5204e35d1ccc87856f6a372cfa8d8c56b641e7e471fa406fa0172919f16a394ecf573cc