Analysis
-
max time kernel
119s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 00:00
Behavioral task
behavioral1
Sample
5bb71ede79b5a1c96f622e28a2730510N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5bb71ede79b5a1c96f622e28a2730510N.exe
Resource
win10v2004-20240802-en
General
-
Target
5bb71ede79b5a1c96f622e28a2730510N.exe
-
Size
3.9MB
-
MD5
5bb71ede79b5a1c96f622e28a2730510
-
SHA1
5ee4ae896c585a550e4489fa81f3f973d22a1f85
-
SHA256
401d23b2aa6b3d8930763f86b368b4f1d69075be111cd28bcfb7e90be6f57b06
-
SHA512
8560ab8c8f9ef1944ce20d9430aa408cfe6f9bf6c798955d41d8226fa281ee35b2d391b0a8024e5e161b6c9dff57f87732260ac2f7ad59dbbd7769c641eca1a5
-
SSDEEP
24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQD1:7C0bNechC0bNechC0bNect
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000017415-42.dat warzonerat behavioral1/files/0x0007000000017234-80.dat warzonerat behavioral1/files/0x0007000000017444-94.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0007000000017415-42.dat aspack_v212_v242 behavioral1/files/0x0007000000017234-80.dat aspack_v212_v242 behavioral1/files/0x0007000000017444-94.dat aspack_v212_v242 -
Executes dropped EXE 6 IoCs
pid Process 2472 explorer.exe 1820 explorer.exe 328 spoolsv.exe 2976 spoolsv.exe 888 spoolsv.exe 2032 spoolsv.exe -
Loads dropped DLL 31 IoCs
pid Process 2700 5bb71ede79b5a1c96f622e28a2730510N.exe 2700 5bb71ede79b5a1c96f622e28a2730510N.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 2204 WerFault.exe 1820 explorer.exe 1820 explorer.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1820 explorer.exe 1820 explorer.exe 1288 WerFault.exe 1288 WerFault.exe 1288 WerFault.exe 1288 WerFault.exe 1288 WerFault.exe 1288 WerFault.exe 1288 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 5bb71ede79b5a1c96f622e28a2730510N.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2120 set thread context of 2700 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 30 PID 2120 set thread context of 2576 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 31 PID 2472 set thread context of 1820 2472 explorer.exe 33 PID 2472 set thread context of 2384 2472 explorer.exe 34 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 5bb71ede79b5a1c96f622e28a2730510N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2204 2976 WerFault.exe 1976 888 WerFault.exe 1288 2032 WerFault.exe 41 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bb71ede79b5a1c96f622e28a2730510N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bb71ede79b5a1c96f622e28a2730510N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2700 5bb71ede79b5a1c96f622e28a2730510N.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 5bb71ede79b5a1c96f622e28a2730510N.exe 2700 5bb71ede79b5a1c96f622e28a2730510N.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe 1820 explorer.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2700 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 30 PID 2120 wrote to memory of 2700 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 30 PID 2120 wrote to memory of 2700 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 30 PID 2120 wrote to memory of 2700 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 30 PID 2120 wrote to memory of 2700 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 30 PID 2120 wrote to memory of 2700 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 30 PID 2120 wrote to memory of 2700 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 30 PID 2120 wrote to memory of 2700 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 30 PID 2120 wrote to memory of 2700 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 30 PID 2120 wrote to memory of 2576 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 31 PID 2120 wrote to memory of 2576 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 31 PID 2120 wrote to memory of 2576 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 31 PID 2120 wrote to memory of 2576 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 31 PID 2120 wrote to memory of 2576 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 31 PID 2120 wrote to memory of 2576 2120 5bb71ede79b5a1c96f622e28a2730510N.exe 31 PID 2700 wrote to memory of 2472 2700 5bb71ede79b5a1c96f622e28a2730510N.exe 32 PID 2700 wrote to memory of 2472 2700 5bb71ede79b5a1c96f622e28a2730510N.exe 32 PID 2700 wrote to memory of 2472 2700 5bb71ede79b5a1c96f622e28a2730510N.exe 32 PID 2700 wrote to memory of 2472 2700 5bb71ede79b5a1c96f622e28a2730510N.exe 32 PID 2472 wrote to memory of 1820 2472 explorer.exe 33 PID 2472 wrote to memory of 1820 2472 explorer.exe 33 PID 2472 wrote to memory of 1820 2472 explorer.exe 33 PID 2472 wrote to memory of 1820 2472 explorer.exe 33 PID 2472 wrote to memory of 1820 2472 explorer.exe 33 PID 2472 wrote to memory of 1820 2472 explorer.exe 33 PID 2472 wrote to memory of 1820 2472 explorer.exe 33 PID 2472 wrote to memory of 1820 2472 explorer.exe 33 PID 2472 wrote to memory of 1820 2472 explorer.exe 33 PID 2472 wrote to memory of 2384 2472 explorer.exe 34 PID 2472 wrote to memory of 2384 2472 explorer.exe 34 PID 2472 wrote to memory of 2384 2472 explorer.exe 34 PID 2472 wrote to memory of 2384 2472 explorer.exe 34 PID 2472 wrote to memory of 2384 2472 explorer.exe 34 PID 2472 wrote to memory of 2384 2472 explorer.exe 34 PID 1820 wrote to memory of 328 1820 explorer.exe 35 PID 1820 wrote to memory of 328 1820 explorer.exe 35 PID 1820 wrote to memory of 328 1820 explorer.exe 35 PID 1820 wrote to memory of 328 1820 explorer.exe 35 PID 1820 wrote to memory of 2976 1820 explorer.exe 36 PID 1820 wrote to memory of 2976 1820 explorer.exe 36 PID 1820 wrote to memory of 2976 1820 explorer.exe 36 PID 1820 wrote to memory of 2976 1820 explorer.exe 36 PID 2976 wrote to memory of 2204 2976 spoolsv.exe 37 PID 2976 wrote to memory of 2204 2976 spoolsv.exe 37 PID 2976 wrote to memory of 2204 2976 spoolsv.exe 37 PID 2976 wrote to memory of 2204 2976 spoolsv.exe 37 PID 1820 wrote to memory of 888 1820 explorer.exe 39 PID 1820 wrote to memory of 888 1820 explorer.exe 39 PID 1820 wrote to memory of 888 1820 explorer.exe 39 PID 1820 wrote to memory of 888 1820 explorer.exe 39 PID 888 wrote to memory of 1976 888 spoolsv.exe 40 PID 888 wrote to memory of 1976 888 spoolsv.exe 40 PID 888 wrote to memory of 1976 888 spoolsv.exe 40 PID 888 wrote to memory of 1976 888 spoolsv.exe 40 PID 1820 wrote to memory of 2032 1820 explorer.exe 41 PID 1820 wrote to memory of 2032 1820 explorer.exe 41 PID 1820 wrote to memory of 2032 1820 explorer.exe 41 PID 1820 wrote to memory of 2032 1820 explorer.exe 41 PID 2032 wrote to memory of 1288 2032 spoolsv.exe 42 PID 2032 wrote to memory of 1288 2032 spoolsv.exe 42 PID 2032 wrote to memory of 1288 2032 spoolsv.exe 42 PID 2032 wrote to memory of 1288 2032 spoolsv.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bb71ede79b5a1c96f622e28a2730510N.exe"C:\Users\Admin\AppData\Local\Temp\5bb71ede79b5a1c96f622e28a2730510N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\5bb71ede79b5a1c96f622e28a2730510N.exe"C:\Users\Admin\AppData\Local\Temp\5bb71ede79b5a1c96f622e28a2730510N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:328
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2204
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1976
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1288
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:2384
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD55bb71ede79b5a1c96f622e28a2730510
SHA15ee4ae896c585a550e4489fa81f3f973d22a1f85
SHA256401d23b2aa6b3d8930763f86b368b4f1d69075be111cd28bcfb7e90be6f57b06
SHA5128560ab8c8f9ef1944ce20d9430aa408cfe6f9bf6c798955d41d8226fa281ee35b2d391b0a8024e5e161b6c9dff57f87732260ac2f7ad59dbbd7769c641eca1a5
-
Filesize
3.9MB
MD57d6eb5aa35a7dcf27759c2fe216d3840
SHA15488e943a9e1157f0d432db81b0f3389c31f5278
SHA256cbbcedf402385f901e983f359ff052f888fcdf967de90e33e8e7763ab9cbcf0d
SHA5127063e36a1ece65dcd151e8e8c2ea5c9563f92ebcce91333d6b4f6cfb933576dd103c093d4e8ed17dbbbb8c40b38c3ee88ea7701d6fd7d80b5233c39a30874455
-
Filesize
3.9MB
MD501f2bd9b6a679146b98adc27fed2d7ed
SHA17a043359f851b2714b36c81110e2b81eb20c02d5
SHA256f3c97e5b14c6b2c3dbe1a7c1cc146cbdf08024d5ff2834c317f8c345e46629f9
SHA5126d66e1dee42e148f6450e3985eb7cfc47a01a0b75c75e9c0b3ed0d1eb0e01a44ccd79d52bac13cfe6746b0d57b613d987ad72f3048fc874dee700dfe4408accc