Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 05:35

General

  • Target

    ca5fa091df6519461da15755e36a4d4ed795581388db81b9f834d20700eeaaeb.exe

  • Size

    2.2MB

  • MD5

    cdd45a122734f4f14ae8c4741cd79eab

  • SHA1

    97c84316d2a17e3deae6c134076f873d60cd8ce4

  • SHA256

    ca5fa091df6519461da15755e36a4d4ed795581388db81b9f834d20700eeaaeb

  • SHA512

    bed5c5d5916e49c0de6fd33a395f583ef72d40c91079ad1de349d68c20a1e6ab6403633b5efdeb02a454a59ebf7558e63a5d809d963c37d3230387524fb282fa

  • SSDEEP

    49152:US8kak8/G2ejlDcpoaPGum5Z8MwtE5d8qdoFZ:UUak88cpogPmUCsJZ

Malware Config

Extracted

Family

warzonerat

C2

zakriexports.com:2017

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 5 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 5 IoCs
  • Detects executables embedding command execution via IExecuteCommand COM object 5 IoCs
  • ModiLoader Second Stage 5 IoCs
  • Warzone RAT payload 5 IoCs
  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca5fa091df6519461da15755e36a4d4ed795581388db81b9f834d20700eeaaeb.exe
    "C:\Users\Admin\AppData\Local\Temp\ca5fa091df6519461da15755e36a4d4ed795581388db81b9f834d20700eeaaeb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\BpcgybqxO.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\SysWOW64\xcopy.exe
        xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y
        3⤵
        • Enumerates system info in registry
        PID:1096
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
        3⤵
          PID:3640
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c mkdir "\\?\C:\Windows "
          3⤵
            PID:4292
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
            3⤵
              PID:2256
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y
              3⤵
              • Enumerates system info in registry
              PID:4852
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
              3⤵
                PID:1800
              • C:\Windows\SysWOW64\xcopy.exe
                xcopy "KDECO.bat" "C:\Windows \System32\" /K /D /H /Y
                3⤵
                • Enumerates system info in registry
                PID:1152
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                3⤵
                  PID:544
                • C:\Windows\SysWOW64\xcopy.exe
                  xcopy "x.bat" "C:\Windows \System32\" /K /D /H /Y
                  3⤵
                  • Enumerates system info in registry
                  PID:3496
                • C:\Windows \System32\easinvoker.exe
                  "C:\\Windows \\System32\\easinvoker.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:6020
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\windows \system32\KDECO.bat""
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4708
                    • C:\Windows\system32\sc.exe
                      sc.exe create truesight binPath="C:\Users\Public\Libraries\truesight.sys" type=kernel
                      5⤵
                      • Launches sc.exe
                      PID:1720
                    • C:\Windows\system32\cmd.exe
                      cmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:5548
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                        6⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5544
                    • C:\Windows\system32\sc.exe
                      sc.exe start truesight
                      5⤵
                      • Launches sc.exe
                      PID:6036
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c "C:\\Windows \\System32\\easinvoker.exe"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4928
                • C:\Windows \System32\easinvoker.exe
                  "C:\\Windows \\System32\\easinvoker.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:3744
              • C:\Users\Public\Libraries\xqbygcpB.pif
                C:\Users\Public\Libraries\xqbygcpB.pif
                2⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1648
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe"
                  3⤵
                    PID:5192

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sc2udnqd.14s.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Public\Libraries\BpcgybqxO.bat

                Filesize

                7KB

                MD5

                0d0d24b46d4bb0e4962595d455020d48

                SHA1

                48b247c1cb2577b28aabd7dfa999e0642b5dc6de

                SHA256

                f46e0cc2c119a32dd87edf97bfc73d985ee97d2c9dc00274b6b20d641e29deea

                SHA512

                d5a8779e1cfd2a284173ce8a205cacb41fc7c744fa84e55682ac50b327c676ff50f668ecd176e0ab84420d143a8023d8b4590362b223704c55f5b0d7e116ba2c

              • C:\Users\Public\Libraries\KDECO.bat

                Filesize

                4KB

                MD5

                785e8193007bcd7858b9df41c9d45f89

                SHA1

                29b206de05ab075138ca9e0b9fccdddf3c30cdfe

                SHA256

                c8e1912a3328802e98563e32eb053ae3e28249b701054af227e9f1ba6bfe24d9

                SHA512

                a4d6fd586800f27939d8c152e89d2a231dc9fd8466e715dfeba22e2aa0428509095e12e6e66f2cb5e40ff5c998b439dc3f6792e20c179f41ac9cae31ada9d45f

              • C:\Users\Public\Libraries\easinvoker.exe

                Filesize

                128KB

                MD5

                231ce1e1d7d98b44371ffff407d68b59

                SHA1

                25510d0f6353dbf0c9f72fc880de7585e34b28ff

                SHA256

                30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

                SHA512

                520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

              • C:\Users\Public\Libraries\netutils.dll

                Filesize

                115KB

                MD5

                ecb0b0d16112f27c57e4048a02802fd5

                SHA1

                f7d1c76802d3948c55114fc0ea82c928936de944

                SHA256

                ae33f291a6f2011ca147c2b48035743aba3c507dcef86e1fa6acb4dee47cbf43

                SHA512

                a18a6cde621274f42e20b4b897df2df984a8e6d420d65198fd6d4193a3a91b8c3ca6905120ac299acd8758da72654e7a650e872425677763894b11c98f03c421

              • C:\Users\Public\Libraries\xqbygcpB.pif

                Filesize

                66KB

                MD5

                c116d3604ceafe7057d77ff27552c215

                SHA1

                452b14432fb5758b46f2897aeccd89f7c82a727d

                SHA256

                7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301

                SHA512

                9202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6

              • memory/1648-58-0x0000000000400000-0x0000000001400000-memory.dmp

                Filesize

                16.0MB

              • memory/1648-63-0x0000000000400000-0x0000000001400000-memory.dmp

                Filesize

                16.0MB

              • memory/1648-61-0x0000000000400000-0x000000000055A000-memory.dmp

                Filesize

                1.4MB

              • memory/1648-51-0x0000000000400000-0x0000000001400000-memory.dmp

                Filesize

                16.0MB

              • memory/1648-56-0x0000000000400000-0x0000000001400000-memory.dmp

                Filesize

                16.0MB

              • memory/3744-54-0x00000000613C0000-0x00000000613E3000-memory.dmp

                Filesize

                140KB

              • memory/3952-2-0x0000000003750000-0x0000000004750000-memory.dmp

                Filesize

                16.0MB

              • memory/3952-4-0x0000000000400000-0x000000000063B000-memory.dmp

                Filesize

                2.2MB

              • memory/3952-1-0x0000000003750000-0x0000000004750000-memory.dmp

                Filesize

                16.0MB

              • memory/3952-0-0x0000000000840000-0x0000000000841000-memory.dmp

                Filesize

                4KB

              • memory/5192-59-0x0000000001470000-0x0000000001471000-memory.dmp

                Filesize

                4KB

              • memory/5544-40-0x000001F47FDD0000-0x000001F47FDE0000-memory.dmp

                Filesize

                64KB

              • memory/5544-44-0x00007FF9946A0000-0x00007FF995161000-memory.dmp

                Filesize

                10.8MB

              • memory/5544-41-0x000001F47FDD0000-0x000001F47FDE0000-memory.dmp

                Filesize

                64KB

              • memory/5544-38-0x00007FF9946A0000-0x00007FF995161000-memory.dmp

                Filesize

                10.8MB

              • memory/5544-28-0x000001F467A20000-0x000001F467A42000-memory.dmp

                Filesize

                136KB

              • memory/6020-27-0x00000000613C0000-0x00000000613E3000-memory.dmp

                Filesize

                140KB