Resubmissions

11-06-2024 09:25

240611-ldkqzaselq 10

30-04-2024 05:42

240430-gd11qsec7w 10

General

  • Target

    HAN HII PAYMENT-USD.doc

  • Size

    70KB

  • Sample

    240430-gd11qsec7w

  • MD5

    1812b0ee6924f6188269c65494e580e8

  • SHA1

    fc83f1d3acb53009cbaa7b9df57676274fc561a1

  • SHA256

    7fb4306a36b61be977dfc6f56443542c9d70273bb97b55d5049cd86608aa0f68

  • SHA512

    5432bbe2f3f54a1ddf8980ad1f34a684d0e7b17bd29cc059c3c20e798dfcab025d68a0b46776630c64b84c062a146e27c2f75f8de57e08f88b1ac8cfed1f8eff

  • SSDEEP

    768:Dpwxw+tCmFeFahP8nmwyd04aCF+Fas0Mxw+tq:DSxrtCmFeFahP81CF+FasZxrt

Malware Config

Extracted

Family

warzonerat

C2

45.137.22.105:4821

Targets

    • Target

      HAN HII PAYMENT-USD.doc

    • Size

      70KB

    • MD5

      1812b0ee6924f6188269c65494e580e8

    • SHA1

      fc83f1d3acb53009cbaa7b9df57676274fc561a1

    • SHA256

      7fb4306a36b61be977dfc6f56443542c9d70273bb97b55d5049cd86608aa0f68

    • SHA512

      5432bbe2f3f54a1ddf8980ad1f34a684d0e7b17bd29cc059c3c20e798dfcab025d68a0b46776630c64b84c062a146e27c2f75f8de57e08f88b1ac8cfed1f8eff

    • SSDEEP

      768:Dpwxw+tCmFeFahP8nmwyd04aCF+Fas0Mxw+tq:DSxrtCmFeFahP81CF+FasZxrt

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks