Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 02:34
Behavioral task
behavioral1
Sample
bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe
Resource
win10v2004-20240412-en
General
-
Target
bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe
-
Size
2.9MB
-
MD5
cec533685df238ca2c999bb4458eca65
-
SHA1
9b50e4d10b75d73b8102180a2a43a2cc91afc045
-
SHA256
bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678
-
SHA512
7dbca1534603f331c3955c38162068c11f87738378d8664b3ea97ce861126e0322e827234e616b596619cfeae655554729bd30be2b778927cd91351ca9759007
-
SSDEEP
24576:bTO7AsmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHq:bTO7Asmw4gxeOw46fUbNecCCFbNecT
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Detects executables packed with ASPack 33 IoCs
resource yara_rule behavioral1/memory/2740-4-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-6-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-7-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-8-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-9-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-10-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-11-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-12-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-13-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-14-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-16-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-15-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-17-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-18-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-21-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-24-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-26-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-28-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-29-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-30-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-31-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-32-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-33-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-34-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-35-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-37-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-38-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-36-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-40-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-70-0x0000000000400000-0x0000000001400000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/2740-71-0x0000000000400000-0x0000000000628000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/632-113-0x0000000000400000-0x0000000001990000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral1/memory/632-166-0x0000000000400000-0x0000000001990000-memory.dmp INDICATOR_EXE_Packed_ASPack -
Warzone RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000014baa-75.dat warzonerat behavioral1/files/0x0007000000014b27-149.dat warzonerat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1280 explorer.exe 632 explorer.exe 1488 explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2764 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 2764 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2524 set thread context of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2740 set thread context of 2764 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 33 PID 2740 set thread context of 2944 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 34 PID 1280 set thread context of 632 1280 explorer.exe 38 PID 632 set thread context of 1488 632 explorer.exe 39 PID 632 set thread context of 1816 632 explorer.exe 40 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 2764 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 1280 explorer.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 2764 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 2764 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 1280 explorer.exe 1280 explorer.exe 1488 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2156 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 28 PID 2524 wrote to memory of 2156 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 28 PID 2524 wrote to memory of 2156 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 28 PID 2524 wrote to memory of 2156 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 28 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2524 wrote to memory of 2740 2524 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 30 PID 2740 wrote to memory of 2764 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 33 PID 2740 wrote to memory of 2764 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 33 PID 2740 wrote to memory of 2764 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 33 PID 2740 wrote to memory of 2764 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 33 PID 2740 wrote to memory of 2764 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 33 PID 2740 wrote to memory of 2764 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 33 PID 2740 wrote to memory of 2764 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 33 PID 2740 wrote to memory of 2764 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 33 PID 2740 wrote to memory of 2764 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 33 PID 2740 wrote to memory of 2944 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 34 PID 2740 wrote to memory of 2944 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 34 PID 2740 wrote to memory of 2944 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 34 PID 2740 wrote to memory of 2944 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 34 PID 2740 wrote to memory of 2944 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 34 PID 2740 wrote to memory of 2944 2740 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 34 PID 2764 wrote to memory of 1280 2764 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 35 PID 2764 wrote to memory of 1280 2764 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 35 PID 2764 wrote to memory of 1280 2764 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 35 PID 2764 wrote to memory of 1280 2764 bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe 35 PID 1280 wrote to memory of 1624 1280 explorer.exe 36 PID 1280 wrote to memory of 1624 1280 explorer.exe 36 PID 1280 wrote to memory of 1624 1280 explorer.exe 36 PID 1280 wrote to memory of 1624 1280 explorer.exe 36 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38 PID 1280 wrote to memory of 632 1280 explorer.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe"C:\Users\Admin\AppData\Local\Temp\bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exeC:\Users\Admin\AppData\Local\Temp\bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exeC:\Users\Admin\AppData\Local\Temp\bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
PID:1624
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:632 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1816
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:2944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5cec533685df238ca2c999bb4458eca65
SHA19b50e4d10b75d73b8102180a2a43a2cc91afc045
SHA256bb6af94db448e5a030dbcf2299c11359cd28acb6d56a2d8a0750e3a62bf8e678
SHA5127dbca1534603f331c3955c38162068c11f87738378d8664b3ea97ce861126e0322e827234e616b596619cfeae655554729bd30be2b778927cd91351ca9759007
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
2.9MB
MD557b6ef60c05685a6ba97d5b4abd79e30
SHA1418d1a22e3579cc80e5f6c1bdb1b3e36e93a6efc
SHA256b7c5c44fdaafb8df0632e21662c29d445c0b1d97b0f0dffc208cce8a10010d82
SHA5120308d0bfdc5006d188d7ab42c1c50b3d52e18cd3b92fec4260f257c31a0f39b8f8631e7eed5263e81dc52be11f2997917a11d11bfad1c4ddeaebc87592bc3b7f