Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2024, 15:15

General

  • Target

    WarCrypter/WarCrypter.exe

  • Size

    1.0MB

  • MD5

    5172e42a4c37c324d1bbde19e2523614

  • SHA1

    82ad13fa0fa289de0bc39f769ed7aff26fb5c149

  • SHA256

    d53fa4cccfb68404f07949fa67b230697b2f3e2acec6535d8ce74ed397ef05c6

  • SHA512

    aadf26baf1e735c55a8fe3cfe68e9053968bc529b1c4b4a70a4441e5cf85d32ed916b5934de5c312d5896d1fab37712e026a8485fe91226428e77d5fbd670697

  • SSDEEP

    24576:3+kh6t3UREOdw3pDhmuU1ITWxLi68+fEo6VDjZCUB:3KMdwZ1mqH+SVHDB

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WarCrypter\WarCrypter.exe
    "C:\Users\Admin\AppData\Local\Temp\WarCrypter\WarCrypter.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Users\Admin\AppData\Local\Temp\build.exe
      "C:\Users\Admin\AppData\Local\Temp\build.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4760
      • C:\ProgramData\module.exe
        C:\ProgramData\module.exe
        3⤵
        • Executes dropped EXE
        PID:3496
    • C:\Users\Admin\AppData\Local\Temp\WarCrypter.exe
      "C:\Users\Admin\AppData\Local\Temp\WarCrypter.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4444
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x504 0x510
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WarCrypter.exe

    Filesize

    447KB

    MD5

    09475620b2afe5f8ebd677cf669e055d

    SHA1

    b23ca6010b25304fc10cc47c79c12655988e207f

    SHA256

    db3f6147d0b91063e017783c8913c12af54238429209feb2d5e01823e1a56a59

    SHA512

    aab79e3359c39f5d9695387c41aba86170c7cb1162db9270d52e8f957295dc6b484b6da9d805c18343430c6e6d858c6993f2db849be4e7fd3ce37471ef9c5880

  • C:\Users\Admin\AppData\Local\Temp\build.exe

    Filesize

    904KB

    MD5

    7aaddd342305fab1f267243390a2d924

    SHA1

    dee646017cd31840bde7fcdffb5b487a1361d5d0

    SHA256

    24c71405384ad6a5c2c85b339b4aba3ab2914b5dfcab0c707861731b1d4ba66f

    SHA512

    ed7553264ba720809a3bb39ca556a1f3c21f9d3f2270f9a481986c9aa5204e35d1ccc87856f6a372cfa8d8c56b641e7e471fa406fa0172919f16a394ecf573cc

  • memory/4444-27-0x0000000074770000-0x0000000074D21000-memory.dmp

    Filesize

    5.7MB

  • memory/4444-26-0x0000000074770000-0x0000000074D21000-memory.dmp

    Filesize

    5.7MB

  • memory/4444-28-0x0000000000BB0000-0x0000000000BC0000-memory.dmp

    Filesize

    64KB

  • memory/4444-29-0x0000000000BB0000-0x0000000000BC0000-memory.dmp

    Filesize

    64KB

  • memory/4444-33-0x0000000000BB0000-0x0000000000BC0000-memory.dmp

    Filesize

    64KB

  • memory/4444-34-0x0000000074770000-0x0000000074D21000-memory.dmp

    Filesize

    5.7MB

  • memory/4444-35-0x0000000000BB0000-0x0000000000BC0000-memory.dmp

    Filesize

    64KB

  • memory/4444-36-0x0000000000BB0000-0x0000000000BC0000-memory.dmp

    Filesize

    64KB

  • memory/4444-37-0x0000000000BB0000-0x0000000000BC0000-memory.dmp

    Filesize

    64KB