Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 01:03
Behavioral task
behavioral1
Sample
9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe
Resource
win10v2004-20240508-en
General
-
Target
9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe
-
Size
1.3MB
-
MD5
76cb5c847e0a3eef8e0746de96ab4459
-
SHA1
dd6727b37cdae9e6860bca004fca312fc026a27d
-
SHA256
9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4
-
SHA512
3758d058c091ce2126d730ab0ae78807e80ed8ee60b6c67429ba58bf521b2862488d2b334ba7ebde46547dab06dc0c076683f1359a554c934c8bd2fcc5f746fd
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWYB:8u0c++OCvkGs9Fa+rd1f26RaYB
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Blasthost.exe netwire behavioral2/memory/3128-11-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4032-26-0x0000000000400000-0x000000000042C000-memory.dmp netwire C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe netwire behavioral2/memory/3252-49-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4032-51-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/1528-75-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2996-14-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2996-22-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RtDCpl64.exeRtDCpl64.exe9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exeRtDCpl64.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation RtDCpl64.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation RtDCpl64.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation RtDCpl64.exe -
Executes dropped EXE 11 IoCs
Processes:
Blasthost.exeHost.exeRtDCpl64.exeBlasthost.exeRtDCpl64.exeRtDCpl64.exeBlasthost.exeRtDCpl64.exeRtDCpl64.exeBlasthost.exeRtDCpl64.exepid process 3128 Blasthost.exe 4032 Host.exe 3636 RtDCpl64.exe 3252 Blasthost.exe 3584 RtDCpl64.exe 4120 RtDCpl64.exe 1528 Blasthost.exe 4332 RtDCpl64.exe 3168 RtDCpl64.exe 2676 Blasthost.exe 4476 RtDCpl64.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exedescription pid process target process PID 1788 set thread context of 2996 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe PID 3636 set thread context of 3584 3636 RtDCpl64.exe RtDCpl64.exe PID 4120 set thread context of 4332 4120 RtDCpl64.exe RtDCpl64.exe PID 3168 set thread context of 4476 3168 RtDCpl64.exe RtDCpl64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5028 schtasks.exe 4156 schtasks.exe 4896 schtasks.exe 5104 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exeBlasthost.exe9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exeRtDCpl64.exedescription pid process target process PID 1788 wrote to memory of 3128 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe Blasthost.exe PID 1788 wrote to memory of 3128 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe Blasthost.exe PID 1788 wrote to memory of 3128 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe Blasthost.exe PID 3128 wrote to memory of 4032 3128 Blasthost.exe Host.exe PID 3128 wrote to memory of 4032 3128 Blasthost.exe Host.exe PID 3128 wrote to memory of 4032 3128 Blasthost.exe Host.exe PID 1788 wrote to memory of 2996 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe PID 1788 wrote to memory of 2996 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe PID 1788 wrote to memory of 2996 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe PID 1788 wrote to memory of 2996 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe PID 1788 wrote to memory of 2996 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe PID 2996 wrote to memory of 2372 2996 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe cmd.exe PID 2996 wrote to memory of 2372 2996 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe cmd.exe PID 2996 wrote to memory of 2372 2996 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe cmd.exe PID 1788 wrote to memory of 5028 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe schtasks.exe PID 1788 wrote to memory of 5028 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe schtasks.exe PID 1788 wrote to memory of 5028 1788 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe schtasks.exe PID 2996 wrote to memory of 2372 2996 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe cmd.exe PID 2996 wrote to memory of 2372 2996 9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe cmd.exe PID 3636 wrote to memory of 3252 3636 RtDCpl64.exe Blasthost.exe PID 3636 wrote to memory of 3252 3636 RtDCpl64.exe Blasthost.exe PID 3636 wrote to memory of 3252 3636 RtDCpl64.exe Blasthost.exe PID 3636 wrote to memory of 3584 3636 RtDCpl64.exe RtDCpl64.exe PID 3636 wrote to memory of 3584 3636 RtDCpl64.exe RtDCpl64.exe PID 3636 wrote to memory of 3584 3636 RtDCpl64.exe RtDCpl64.exe PID 3636 wrote to memory of 3584 3636 RtDCpl64.exe RtDCpl64.exe PID 3636 wrote to memory of 3584 3636 RtDCpl64.exe RtDCpl64.exe PID 3584 wrote to memory of 4228 3584 RtDCpl64.exe cmd.exe PID 3584 wrote to memory of 4228 3584 RtDCpl64.exe cmd.exe PID 3584 wrote to memory of 4228 3584 RtDCpl64.exe cmd.exe PID 3636 wrote to memory of 4156 3636 RtDCpl64.exe schtasks.exe PID 3636 wrote to memory of 4156 3636 RtDCpl64.exe schtasks.exe PID 3636 wrote to memory of 4156 3636 RtDCpl64.exe schtasks.exe PID 3584 wrote to memory of 4228 3584 RtDCpl64.exe cmd.exe PID 3584 wrote to memory of 4228 3584 RtDCpl64.exe cmd.exe PID 4120 wrote to memory of 1528 4120 RtDCpl64.exe Blasthost.exe PID 4120 wrote to memory of 1528 4120 RtDCpl64.exe Blasthost.exe PID 4120 wrote to memory of 1528 4120 RtDCpl64.exe Blasthost.exe PID 4120 wrote to memory of 4332 4120 RtDCpl64.exe RtDCpl64.exe PID 4120 wrote to memory of 4332 4120 RtDCpl64.exe RtDCpl64.exe PID 4120 wrote to memory of 4332 4120 RtDCpl64.exe RtDCpl64.exe PID 4120 wrote to memory of 4332 4120 RtDCpl64.exe RtDCpl64.exe PID 4120 wrote to memory of 4332 4120 RtDCpl64.exe RtDCpl64.exe PID 4332 wrote to memory of 4108 4332 RtDCpl64.exe cmd.exe PID 4332 wrote to memory of 4108 4332 RtDCpl64.exe cmd.exe PID 4332 wrote to memory of 4108 4332 RtDCpl64.exe cmd.exe PID 4120 wrote to memory of 4896 4120 RtDCpl64.exe schtasks.exe PID 4120 wrote to memory of 4896 4120 RtDCpl64.exe schtasks.exe PID 4120 wrote to memory of 4896 4120 RtDCpl64.exe schtasks.exe PID 4332 wrote to memory of 4108 4332 RtDCpl64.exe cmd.exe PID 4332 wrote to memory of 4108 4332 RtDCpl64.exe cmd.exe PID 3168 wrote to memory of 2676 3168 RtDCpl64.exe Blasthost.exe PID 3168 wrote to memory of 2676 3168 RtDCpl64.exe Blasthost.exe PID 3168 wrote to memory of 2676 3168 RtDCpl64.exe Blasthost.exe PID 3168 wrote to memory of 4476 3168 RtDCpl64.exe RtDCpl64.exe PID 3168 wrote to memory of 4476 3168 RtDCpl64.exe RtDCpl64.exe PID 3168 wrote to memory of 4476 3168 RtDCpl64.exe RtDCpl64.exe PID 3168 wrote to memory of 4476 3168 RtDCpl64.exe RtDCpl64.exe PID 3168 wrote to memory of 4476 3168 RtDCpl64.exe RtDCpl64.exe PID 4476 wrote to memory of 4592 4476 RtDCpl64.exe cmd.exe PID 4476 wrote to memory of 4592 4476 RtDCpl64.exe cmd.exe PID 4476 wrote to memory of 4592 4476 RtDCpl64.exe cmd.exe PID 3168 wrote to memory of 5104 3168 RtDCpl64.exe schtasks.exe PID 3168 wrote to memory of 5104 3168 RtDCpl64.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe"C:\Users\Admin\AppData\Local\Temp\9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe"C:\Users\Admin\AppData\Local\Temp\9cc24bad96f3641974acadd1a399aef3ac41f77ffa653b8167b26ff547181da4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2372
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:5028
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:3252 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:4228
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4156
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:4108
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:4896
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:4592
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292
-
Filesize
1.3MB
MD583d50dd11e2f8f0220fbb754a29751f1
SHA138d058c3d5d2bd7d06df891f4878c8294980843f
SHA256f882eccd192b78577f9d8f38c4a0057c4df6fe08d5fa429dd786d371a377926e
SHA512cab1bb38747a89ee1b3f2d39a4ecbde6c01a2045d86c23c691a11f453aa6ffbb405c52aa123f11be0207226656defda5bfd8b600da05b377acea4ba30a5d26d4