Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 18:39
Behavioral task
behavioral1
Sample
0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe
Resource
win10v2004-20240226-en
General
-
Target
0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe
-
Size
1.3MB
-
MD5
2b1337e4e48797deb0b880a8b04c9b88
-
SHA1
313b8bdc2c597826858f3fd6fbd5a6e1300e7d69
-
SHA256
0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e
-
SHA512
eadb85f13c0c4f950470ec8f1daf932b06f31de7862b72b0cda5649ad6913111532fd1b029fdc7e78e79402ca4673fcc1fd74a1e45c5e7df3342a874d2a46df2
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWYK:8u0c++OCvkGs9Fa+rd1f26RaYK
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x000d00000001224d-2.dat netwire behavioral1/memory/1880-23-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2532-45-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/files/0x0007000000014326-50.dat netwire behavioral1/memory/1912-90-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2532-95-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2536-27-0x00000000000C0000-0x00000000000DD000-memory.dmp warzonerat behavioral1/memory/2536-38-0x00000000000C0000-0x00000000000DD000-memory.dmp warzonerat behavioral1/memory/2040-70-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat behavioral1/memory/2040-81-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat -
Executes dropped EXE 8 IoCs
pid Process 1880 Blasthost.exe 2532 Host.exe 2176 RtDCpl64.exe 1912 Blasthost.exe 2040 RtDCpl64.exe 1700 RtDCpl64.exe 1884 Blasthost.exe 788 RtDCpl64.exe -
Loads dropped DLL 13 IoCs
pid Process 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 1880 Blasthost.exe 1880 Blasthost.exe 2176 RtDCpl64.exe 2176 RtDCpl64.exe 2176 RtDCpl64.exe 2176 RtDCpl64.exe 1700 RtDCpl64.exe 1700 RtDCpl64.exe 1700 RtDCpl64.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000014326-50.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2084 set thread context of 2536 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 30 PID 2176 set thread context of 2040 2176 RtDCpl64.exe 40 PID 1700 set thread context of 788 1700 RtDCpl64.exe 47 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2096 schtasks.exe 3032 schtasks.exe 920 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1880 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 28 PID 2084 wrote to memory of 1880 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 28 PID 2084 wrote to memory of 1880 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 28 PID 2084 wrote to memory of 1880 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 28 PID 1880 wrote to memory of 2532 1880 Blasthost.exe 29 PID 1880 wrote to memory of 2532 1880 Blasthost.exe 29 PID 1880 wrote to memory of 2532 1880 Blasthost.exe 29 PID 1880 wrote to memory of 2532 1880 Blasthost.exe 29 PID 2084 wrote to memory of 2536 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 30 PID 2084 wrote to memory of 2536 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 30 PID 2084 wrote to memory of 2536 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 30 PID 2084 wrote to memory of 2536 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 30 PID 2084 wrote to memory of 2536 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 30 PID 2084 wrote to memory of 2536 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 30 PID 2536 wrote to memory of 2544 2536 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 31 PID 2536 wrote to memory of 2544 2536 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 31 PID 2536 wrote to memory of 2544 2536 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 31 PID 2536 wrote to memory of 2544 2536 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 31 PID 2084 wrote to memory of 2096 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 32 PID 2084 wrote to memory of 2096 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 32 PID 2084 wrote to memory of 2096 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 32 PID 2084 wrote to memory of 2096 2084 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 32 PID 2536 wrote to memory of 2544 2536 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 31 PID 2536 wrote to memory of 2544 2536 0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe 31 PID 2128 wrote to memory of 2176 2128 taskeng.exe 38 PID 2128 wrote to memory of 2176 2128 taskeng.exe 38 PID 2128 wrote to memory of 2176 2128 taskeng.exe 38 PID 2128 wrote to memory of 2176 2128 taskeng.exe 38 PID 2176 wrote to memory of 1912 2176 RtDCpl64.exe 39 PID 2176 wrote to memory of 1912 2176 RtDCpl64.exe 39 PID 2176 wrote to memory of 1912 2176 RtDCpl64.exe 39 PID 2176 wrote to memory of 1912 2176 RtDCpl64.exe 39 PID 2176 wrote to memory of 2040 2176 RtDCpl64.exe 40 PID 2176 wrote to memory of 2040 2176 RtDCpl64.exe 40 PID 2176 wrote to memory of 2040 2176 RtDCpl64.exe 40 PID 2176 wrote to memory of 2040 2176 RtDCpl64.exe 40 PID 2176 wrote to memory of 2040 2176 RtDCpl64.exe 40 PID 2176 wrote to memory of 2040 2176 RtDCpl64.exe 40 PID 2040 wrote to memory of 2720 2040 RtDCpl64.exe 41 PID 2040 wrote to memory of 2720 2040 RtDCpl64.exe 41 PID 2040 wrote to memory of 2720 2040 RtDCpl64.exe 41 PID 2040 wrote to memory of 2720 2040 RtDCpl64.exe 41 PID 2176 wrote to memory of 3032 2176 RtDCpl64.exe 43 PID 2176 wrote to memory of 3032 2176 RtDCpl64.exe 43 PID 2176 wrote to memory of 3032 2176 RtDCpl64.exe 43 PID 2176 wrote to memory of 3032 2176 RtDCpl64.exe 43 PID 2040 wrote to memory of 2720 2040 RtDCpl64.exe 41 PID 2040 wrote to memory of 2720 2040 RtDCpl64.exe 41 PID 2128 wrote to memory of 1700 2128 taskeng.exe 45 PID 2128 wrote to memory of 1700 2128 taskeng.exe 45 PID 2128 wrote to memory of 1700 2128 taskeng.exe 45 PID 2128 wrote to memory of 1700 2128 taskeng.exe 45 PID 1700 wrote to memory of 1884 1700 RtDCpl64.exe 46 PID 1700 wrote to memory of 1884 1700 RtDCpl64.exe 46 PID 1700 wrote to memory of 1884 1700 RtDCpl64.exe 46 PID 1700 wrote to memory of 1884 1700 RtDCpl64.exe 46 PID 1700 wrote to memory of 788 1700 RtDCpl64.exe 47 PID 1700 wrote to memory of 788 1700 RtDCpl64.exe 47 PID 1700 wrote to memory of 788 1700 RtDCpl64.exe 47 PID 1700 wrote to memory of 788 1700 RtDCpl64.exe 47 PID 1700 wrote to memory of 788 1700 RtDCpl64.exe 47 PID 1700 wrote to memory of 788 1700 RtDCpl64.exe 47 PID 1700 wrote to memory of 920 1700 RtDCpl64.exe 48 PID 1700 wrote to memory of 920 1700 RtDCpl64.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe"C:\Users\Admin\AppData\Local\Temp\0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:2532
-
-
-
C:\Users\Admin\AppData\Local\Temp\0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe"C:\Users\Admin\AppData\Local\Temp\0cee1af392a0f85e3378ac6514b0d8be8cead46a4b60c2a9bbb1c7d0cc09ca9e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2544
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2096
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3F50D15E-7554-4B4A-BDE2-654C46C15E5B} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:1912
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:2720
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:3032
-
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:1884
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
PID:788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:3036
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD52028fdd9b102234febe0442336a55bbc
SHA16db5f3bcf88809a7b1cd310c3fb6ad6bb04ddd0b
SHA2560d6d999966e8eca56034af9ad1bc56d43418ee3c9cbc792dbc948865432fc7c8
SHA512d0b1debb74ba4d1f072e2196e4e5ef947a1a9b95f5906a4568fa0ab9ff184c8962a57e0a216cdec25d2159a06c476770f6551aa9cf6b2fc8a78bf4dc7c67f8ff
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292