Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 21:11
Behavioral task
behavioral1
Sample
46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe
Resource
win10v2004-20240802-en
General
-
Target
46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe
-
Size
1.3MB
-
MD5
499db57ae5fefe7d0e2eb2e2e27553fd
-
SHA1
e62b0892f9ab1152e8340570e0c25fd678670378
-
SHA256
46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4
-
SHA512
71011c0a68a878c58c6726af2e2d4449ca183ea2a8848166bd9352a8ae73cb4ffe7bbb86a99db52103c9c4992db77ac6305731170966d2d97eeaa1b07598530f
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWYw:8u0c++OCvkGs9Fa+rd1f26RaYw
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x000a0000000120d5-2.dat netwire behavioral1/memory/2000-23-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2420-44-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/files/0x0009000000017355-45.dat netwire behavioral1/memory/2756-82-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2420-91-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2204-27-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat behavioral1/memory/2204-37-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat -
Executes dropped EXE 11 IoCs
pid Process 2000 Blasthost.exe 2420 Host.exe 2788 RtDCpl64.exe 2756 Blasthost.exe 2560 RtDCpl64.exe 2056 RtDCpl64.exe 2832 Blasthost.exe 444 RtDCpl64.exe 2896 RtDCpl64.exe 2236 Blasthost.exe 1768 RtDCpl64.exe -
Loads dropped DLL 16 IoCs
pid Process 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 2000 Blasthost.exe 2000 Blasthost.exe 2788 RtDCpl64.exe 2788 RtDCpl64.exe 2788 RtDCpl64.exe 2788 RtDCpl64.exe 2056 RtDCpl64.exe 2056 RtDCpl64.exe 2056 RtDCpl64.exe 2896 RtDCpl64.exe 2896 RtDCpl64.exe 2896 RtDCpl64.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000017355-45.dat autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2296 set thread context of 2204 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 30 PID 2788 set thread context of 2560 2788 RtDCpl64.exe 38 PID 2056 set thread context of 444 2056 RtDCpl64.exe 47 PID 2896 set thread context of 1768 2896 RtDCpl64.exe 54 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blasthost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1696 schtasks.exe 1668 schtasks.exe 1304 schtasks.exe 812 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2000 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 28 PID 2296 wrote to memory of 2000 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 28 PID 2296 wrote to memory of 2000 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 28 PID 2296 wrote to memory of 2000 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 28 PID 2000 wrote to memory of 2420 2000 Blasthost.exe 29 PID 2000 wrote to memory of 2420 2000 Blasthost.exe 29 PID 2000 wrote to memory of 2420 2000 Blasthost.exe 29 PID 2000 wrote to memory of 2420 2000 Blasthost.exe 29 PID 2296 wrote to memory of 2204 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 30 PID 2296 wrote to memory of 2204 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 30 PID 2296 wrote to memory of 2204 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 30 PID 2296 wrote to memory of 2204 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 30 PID 2296 wrote to memory of 2204 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 30 PID 2296 wrote to memory of 2204 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 30 PID 2204 wrote to memory of 1244 2204 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 31 PID 2204 wrote to memory of 1244 2204 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 31 PID 2204 wrote to memory of 1244 2204 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 31 PID 2204 wrote to memory of 1244 2204 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 31 PID 2296 wrote to memory of 812 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 33 PID 2296 wrote to memory of 812 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 33 PID 2296 wrote to memory of 812 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 33 PID 2296 wrote to memory of 812 2296 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 33 PID 2204 wrote to memory of 1244 2204 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 31 PID 2204 wrote to memory of 1244 2204 46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe 31 PID 2748 wrote to memory of 2788 2748 taskeng.exe 36 PID 2748 wrote to memory of 2788 2748 taskeng.exe 36 PID 2748 wrote to memory of 2788 2748 taskeng.exe 36 PID 2748 wrote to memory of 2788 2748 taskeng.exe 36 PID 2788 wrote to memory of 2756 2788 RtDCpl64.exe 37 PID 2788 wrote to memory of 2756 2788 RtDCpl64.exe 37 PID 2788 wrote to memory of 2756 2788 RtDCpl64.exe 37 PID 2788 wrote to memory of 2756 2788 RtDCpl64.exe 37 PID 2788 wrote to memory of 2560 2788 RtDCpl64.exe 38 PID 2788 wrote to memory of 2560 2788 RtDCpl64.exe 38 PID 2788 wrote to memory of 2560 2788 RtDCpl64.exe 38 PID 2788 wrote to memory of 2560 2788 RtDCpl64.exe 38 PID 2788 wrote to memory of 2560 2788 RtDCpl64.exe 38 PID 2788 wrote to memory of 2560 2788 RtDCpl64.exe 38 PID 2560 wrote to memory of 2424 2560 RtDCpl64.exe 39 PID 2560 wrote to memory of 2424 2560 RtDCpl64.exe 39 PID 2560 wrote to memory of 2424 2560 RtDCpl64.exe 39 PID 2560 wrote to memory of 2424 2560 RtDCpl64.exe 39 PID 2788 wrote to memory of 1696 2788 RtDCpl64.exe 41 PID 2788 wrote to memory of 1696 2788 RtDCpl64.exe 41 PID 2788 wrote to memory of 1696 2788 RtDCpl64.exe 41 PID 2788 wrote to memory of 1696 2788 RtDCpl64.exe 41 PID 2560 wrote to memory of 2424 2560 RtDCpl64.exe 39 PID 2560 wrote to memory of 2424 2560 RtDCpl64.exe 39 PID 2748 wrote to memory of 2056 2748 taskeng.exe 45 PID 2748 wrote to memory of 2056 2748 taskeng.exe 45 PID 2748 wrote to memory of 2056 2748 taskeng.exe 45 PID 2748 wrote to memory of 2056 2748 taskeng.exe 45 PID 2056 wrote to memory of 2832 2056 RtDCpl64.exe 46 PID 2056 wrote to memory of 2832 2056 RtDCpl64.exe 46 PID 2056 wrote to memory of 2832 2056 RtDCpl64.exe 46 PID 2056 wrote to memory of 2832 2056 RtDCpl64.exe 46 PID 2056 wrote to memory of 444 2056 RtDCpl64.exe 47 PID 2056 wrote to memory of 444 2056 RtDCpl64.exe 47 PID 2056 wrote to memory of 444 2056 RtDCpl64.exe 47 PID 2056 wrote to memory of 444 2056 RtDCpl64.exe 47 PID 2056 wrote to memory of 444 2056 RtDCpl64.exe 47 PID 2056 wrote to memory of 444 2056 RtDCpl64.exe 47 PID 2056 wrote to memory of 1668 2056 RtDCpl64.exe 48 PID 2056 wrote to memory of 1668 2056 RtDCpl64.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe"C:\Users\Admin\AppData\Local\Temp\46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:2420
-
-
-
C:\Users\Admin\AppData\Local\Temp\46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe"C:\Users\Admin\AppData\Local\Temp\46bc1e31c0f3eab8f3bebd76de2e6d8409ae42f61db7de1b2d7b1ee6a19b5ec4.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1244
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:812
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {84720FFB-038F-4973-B968-59FC772ABA11} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:2756
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1696
-
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:2832
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1668
-
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:2236
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5777099533202d97df6c2cf23ceb2e091
SHA1f0b9816f041b1b989f7c59260380615ba3790eb6
SHA256b98dc7cc3fadce4737d62665d7930625a0d84bd21cecbee74fae876d50da1041
SHA51293186353829d9fb42502b850385d546418c1d19f2cb9769ca0b909618ba30600ec932f5924ab4dd55a5bf49edeeb401060e1a67f3500fd21b51eca603f621a1a
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292