Analysis

  • max time kernel
    151s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2024 08:15

General

  • Target

    ca12a3fc8f0bca64e5410622a77a633d32e15ac047daeac132f3595d5e1b7f99N.exe

  • Size

    3.9MB

  • MD5

    b6d9d4fc1ce31f977bcd7f2bd7b899b0

  • SHA1

    5c0befc6c9c01a04721e6cbf466d7fe15aeeaa8d

  • SHA256

    ca12a3fc8f0bca64e5410622a77a633d32e15ac047daeac132f3595d5e1b7f99

  • SHA512

    1688011b7ae9ca23c5486015719852c4a56e834369c7a98e234a5a1c1b0e373d1d1d3bbf468b29a8a936eb0b7414435dbe935fbb888281cc990d20fe399e384d

  • SSDEEP

    24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDw:7C0bNechC0bNechC0bNecI

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca12a3fc8f0bca64e5410622a77a633d32e15ac047daeac132f3595d5e1b7f99N.exe
    "C:\Users\Admin\AppData\Local\Temp\ca12a3fc8f0bca64e5410622a77a633d32e15ac047daeac132f3595d5e1b7f99N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\ca12a3fc8f0bca64e5410622a77a633d32e15ac047daeac132f3595d5e1b7f99N.exe
      "C:\Users\Admin\AppData\Local\Temp\ca12a3fc8f0bca64e5410622a77a633d32e15ac047daeac132f3595d5e1b7f99N.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2740
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2592
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:540
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1704
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              6⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2148
              • \??\c:\windows\system\svchost.exe
                c:\windows\system\svchost.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2600
            • C:\Windows\SysWOW64\diskperf.exe
              "C:\Windows\SysWOW64\diskperf.exe"
              6⤵
                PID:2876
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2244
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2512
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2576
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2156
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2420
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1056
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1640
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2000
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1964
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1512
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:236
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 236 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1596
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2468
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2852
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2980
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 36
                6⤵
                • Program crash
                PID:2456
          • C:\Windows\SysWOW64\diskperf.exe
            "C:\Windows\SysWOW64\diskperf.exe"
            4⤵
              PID:2568
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          2⤵
            PID:2996

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

          Filesize

          3.9MB

          MD5

          b6d9d4fc1ce31f977bcd7f2bd7b899b0

          SHA1

          5c0befc6c9c01a04721e6cbf466d7fe15aeeaa8d

          SHA256

          ca12a3fc8f0bca64e5410622a77a633d32e15ac047daeac132f3595d5e1b7f99

          SHA512

          1688011b7ae9ca23c5486015719852c4a56e834369c7a98e234a5a1c1b0e373d1d1d3bbf468b29a8a936eb0b7414435dbe935fbb888281cc990d20fe399e384d

        • C:\Windows\system\explorer.exe

          Filesize

          3.9MB

          MD5

          97d738b34eb8a5d1a722d7796a445663

          SHA1

          a5f3aa57363710962b870fe31f1fc5a8fb9f5b9b

          SHA256

          9f23003669f677ddb8742039cebd903dfcd5024ab422215cb97d159d1ffd6280

          SHA512

          176c2f88e0a10d1a10eb5a23a2b000346d1259773ee8dcad4d0322197ee30f9e6077d973802f2ddbb5c257e233c137fc3e38a1803048aeb73a26173e6b7e56ab

        • \Windows\system\spoolsv.exe

          Filesize

          3.9MB

          MD5

          9de56ec8db2481925fe5ab11d2f9d015

          SHA1

          e3f1dc7d4eb03f1679fe983fa91e39085bc3554f

          SHA256

          2dbd59f07c0704f2ebd998abce533009107f3c46ea24ed690f710861e33d1fdc

          SHA512

          50f2ee83e3966a68795f4644cbce019b539783bb3d4b6192fc842e62c030405b6a8d544f951172ab0548dea8e1d378e97542e615f2d38de42e30a2ab12335228

        • memory/540-117-0x0000000002DB0000-0x0000000002EC4000-memory.dmp

          Filesize

          1.1MB

        • memory/540-136-0x0000000002DB0000-0x0000000002EC4000-memory.dmp

          Filesize

          1.1MB

        • memory/540-105-0x0000000002DB0000-0x0000000002EC4000-memory.dmp

          Filesize

          1.1MB

        • memory/540-264-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/540-172-0x0000000002DB0000-0x0000000002EC4000-memory.dmp

          Filesize

          1.1MB

        • memory/540-164-0x0000000002DB0000-0x0000000002EC4000-memory.dmp

          Filesize

          1.1MB

        • memory/540-118-0x0000000002DB0000-0x0000000002EC4000-memory.dmp

          Filesize

          1.1MB

        • memory/540-146-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/540-143-0x0000000002DB0000-0x0000000002EC4000-memory.dmp

          Filesize

          1.1MB

        • memory/540-127-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1640-174-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1704-247-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1704-144-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1704-104-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1704-106-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1704-236-0x0000000002C20000-0x0000000002D34000-memory.dmp

          Filesize

          1.1MB

        • memory/1704-103-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2148-254-0x0000000002F50000-0x0000000003064000-memory.dmp

          Filesize

          1.1MB

        • memory/2148-260-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2244-119-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2420-156-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2468-215-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2568-95-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2592-57-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2592-51-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2592-54-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2592-52-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2592-53-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2592-87-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2600-263-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2600-255-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2740-12-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2740-14-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2740-10-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2740-25-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2740-56-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2740-48-0x0000000003010000-0x0000000003124000-memory.dmp

          Filesize

          1.1MB

        • memory/2740-18-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2740-49-0x0000000003010000-0x0000000003124000-memory.dmp

          Filesize

          1.1MB

        • memory/2792-35-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2792-6-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/2792-4-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2792-3-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/2792-2-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2792-0-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2792-1-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2996-33-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2996-30-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2996-37-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2996-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2996-26-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB