Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 10:14
Behavioral task
behavioral1
Sample
04f74088eccf00f8b5f064e40d23ca50.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
04f74088eccf00f8b5f064e40d23ca50.exe
Resource
win10v2004-20240508-en
General
-
Target
04f74088eccf00f8b5f064e40d23ca50.exe
-
Size
1.3MB
-
MD5
04f74088eccf00f8b5f064e40d23ca50
-
SHA1
49d23212f6c8ac9571f4f2b76dc1e9d94bdd3484
-
SHA256
8179e523d196826f89bf5850d4d6a3dc6ec6ebf8240f3e6c9dfb5b619f1d6f49
-
SHA512
f139786a54aa5a2dd798934cd5589f19cbb936d93fa9438e599b2db78ac4f5bbe2f5c3dfafdf93e216100c11391376d13961251a17cda1e5b17487f280af8001
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWY0:8u0c++OCvkGs9Fa+rd1f26RaY0
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x000c000000015cce-2.dat netwire behavioral1/memory/2216-23-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1704-45-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/files/0x00070000000161b3-49.dat netwire behavioral1/memory/1432-86-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1704-89-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2664-38-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat behavioral1/memory/2664-29-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat -
Executes dropped EXE 8 IoCs
pid Process 2216 Blasthost.exe 1704 Host.exe 240 RtDCpl64.exe 1432 Blasthost.exe 404 RtDCpl64.exe 2096 RtDCpl64.exe 1556 Blasthost.exe 1680 RtDCpl64.exe -
Loads dropped DLL 13 IoCs
pid Process 2416 04f74088eccf00f8b5f064e40d23ca50.exe 2416 04f74088eccf00f8b5f064e40d23ca50.exe 2416 04f74088eccf00f8b5f064e40d23ca50.exe 2416 04f74088eccf00f8b5f064e40d23ca50.exe 2216 Blasthost.exe 2216 Blasthost.exe 240 RtDCpl64.exe 240 RtDCpl64.exe 240 RtDCpl64.exe 240 RtDCpl64.exe 2096 RtDCpl64.exe 2096 RtDCpl64.exe 2096 RtDCpl64.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000161b3-49.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2416 set thread context of 2664 2416 04f74088eccf00f8b5f064e40d23ca50.exe 30 PID 240 set thread context of 404 240 RtDCpl64.exe 38 PID 2096 set thread context of 1680 2096 RtDCpl64.exe 47 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2060 schtasks.exe 2736 schtasks.exe 360 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2216 2416 04f74088eccf00f8b5f064e40d23ca50.exe 28 PID 2416 wrote to memory of 2216 2416 04f74088eccf00f8b5f064e40d23ca50.exe 28 PID 2416 wrote to memory of 2216 2416 04f74088eccf00f8b5f064e40d23ca50.exe 28 PID 2416 wrote to memory of 2216 2416 04f74088eccf00f8b5f064e40d23ca50.exe 28 PID 2216 wrote to memory of 1704 2216 Blasthost.exe 29 PID 2216 wrote to memory of 1704 2216 Blasthost.exe 29 PID 2216 wrote to memory of 1704 2216 Blasthost.exe 29 PID 2216 wrote to memory of 1704 2216 Blasthost.exe 29 PID 2416 wrote to memory of 2664 2416 04f74088eccf00f8b5f064e40d23ca50.exe 30 PID 2416 wrote to memory of 2664 2416 04f74088eccf00f8b5f064e40d23ca50.exe 30 PID 2416 wrote to memory of 2664 2416 04f74088eccf00f8b5f064e40d23ca50.exe 30 PID 2416 wrote to memory of 2664 2416 04f74088eccf00f8b5f064e40d23ca50.exe 30 PID 2416 wrote to memory of 2664 2416 04f74088eccf00f8b5f064e40d23ca50.exe 30 PID 2416 wrote to memory of 2664 2416 04f74088eccf00f8b5f064e40d23ca50.exe 30 PID 2416 wrote to memory of 2060 2416 04f74088eccf00f8b5f064e40d23ca50.exe 31 PID 2416 wrote to memory of 2060 2416 04f74088eccf00f8b5f064e40d23ca50.exe 31 PID 2416 wrote to memory of 2060 2416 04f74088eccf00f8b5f064e40d23ca50.exe 31 PID 2416 wrote to memory of 2060 2416 04f74088eccf00f8b5f064e40d23ca50.exe 31 PID 2664 wrote to memory of 2720 2664 04f74088eccf00f8b5f064e40d23ca50.exe 33 PID 2664 wrote to memory of 2720 2664 04f74088eccf00f8b5f064e40d23ca50.exe 33 PID 2664 wrote to memory of 2720 2664 04f74088eccf00f8b5f064e40d23ca50.exe 33 PID 2664 wrote to memory of 2720 2664 04f74088eccf00f8b5f064e40d23ca50.exe 33 PID 2664 wrote to memory of 2720 2664 04f74088eccf00f8b5f064e40d23ca50.exe 33 PID 2664 wrote to memory of 2720 2664 04f74088eccf00f8b5f064e40d23ca50.exe 33 PID 1824 wrote to memory of 240 1824 taskeng.exe 36 PID 1824 wrote to memory of 240 1824 taskeng.exe 36 PID 1824 wrote to memory of 240 1824 taskeng.exe 36 PID 1824 wrote to memory of 240 1824 taskeng.exe 36 PID 240 wrote to memory of 1432 240 RtDCpl64.exe 37 PID 240 wrote to memory of 1432 240 RtDCpl64.exe 37 PID 240 wrote to memory of 1432 240 RtDCpl64.exe 37 PID 240 wrote to memory of 1432 240 RtDCpl64.exe 37 PID 240 wrote to memory of 404 240 RtDCpl64.exe 38 PID 240 wrote to memory of 404 240 RtDCpl64.exe 38 PID 240 wrote to memory of 404 240 RtDCpl64.exe 38 PID 240 wrote to memory of 404 240 RtDCpl64.exe 38 PID 240 wrote to memory of 404 240 RtDCpl64.exe 38 PID 240 wrote to memory of 404 240 RtDCpl64.exe 38 PID 240 wrote to memory of 2736 240 RtDCpl64.exe 39 PID 240 wrote to memory of 2736 240 RtDCpl64.exe 39 PID 240 wrote to memory of 2736 240 RtDCpl64.exe 39 PID 240 wrote to memory of 2736 240 RtDCpl64.exe 39 PID 404 wrote to memory of 1672 404 RtDCpl64.exe 41 PID 404 wrote to memory of 1672 404 RtDCpl64.exe 41 PID 404 wrote to memory of 1672 404 RtDCpl64.exe 41 PID 404 wrote to memory of 1672 404 RtDCpl64.exe 41 PID 404 wrote to memory of 1672 404 RtDCpl64.exe 41 PID 404 wrote to memory of 1672 404 RtDCpl64.exe 41 PID 1824 wrote to memory of 2096 1824 taskeng.exe 45 PID 1824 wrote to memory of 2096 1824 taskeng.exe 45 PID 1824 wrote to memory of 2096 1824 taskeng.exe 45 PID 1824 wrote to memory of 2096 1824 taskeng.exe 45 PID 2096 wrote to memory of 1556 2096 RtDCpl64.exe 46 PID 2096 wrote to memory of 1556 2096 RtDCpl64.exe 46 PID 2096 wrote to memory of 1556 2096 RtDCpl64.exe 46 PID 2096 wrote to memory of 1556 2096 RtDCpl64.exe 46 PID 2096 wrote to memory of 1680 2096 RtDCpl64.exe 47 PID 2096 wrote to memory of 1680 2096 RtDCpl64.exe 47 PID 2096 wrote to memory of 1680 2096 RtDCpl64.exe 47 PID 2096 wrote to memory of 1680 2096 RtDCpl64.exe 47 PID 2096 wrote to memory of 1680 2096 RtDCpl64.exe 47 PID 2096 wrote to memory of 1680 2096 RtDCpl64.exe 47 PID 1680 wrote to memory of 548 1680 RtDCpl64.exe 48 PID 1680 wrote to memory of 548 1680 RtDCpl64.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\04f74088eccf00f8b5f064e40d23ca50.exe"C:\Users\Admin\AppData\Local\Temp\04f74088eccf00f8b5f064e40d23ca50.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:1704
-
-
-
C:\Users\Admin\AppData\Local\Temp\04f74088eccf00f8b5f064e40d23ca50.exe"C:\Users\Admin\AppData\Local\Temp\04f74088eccf00f8b5f064e40d23ca50.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2720
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2060
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {205CBF31-44D5-4AC0-A80B-D644638108D4} S-1-5-21-2248906074-2862704502-246302768-1000:GHPZRGFC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:1432
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:1672
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:2736
-
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:1556
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵PID:548
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
PID:360
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5671a37104f8425ad1c6252601cc20844
SHA1d3f94a8a5b92af89dc7c9e9d6dfdf8cf425132ff
SHA2564fd1a50879656532610a4876ff417946c55e1bb719c45e451185fc96f3f330fb
SHA512c9b112bbed0052c2b5b8ebfcf180a9ac1bf09dbbf216d923390175b93ec94ba1e87ccb60935ae73854a82f9776141e5f0f0507033ba676f725277b5833c0a784
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292