Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 21:53
Behavioral task
behavioral1
Sample
538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe
Resource
win10v2004-20241007-en
General
-
Target
538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe
-
Size
1.4MB
-
MD5
c1928cd8087c119572ae83e4709bbaae
-
SHA1
5b1cad7a98dd2d731b9ee55ed9e42d12337c8786
-
SHA256
538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e
-
SHA512
648455ed36c759ffc590f1ad84ddfcc4f8d907d1901c95e2834cab5cebae11a95519fd6348185113d689243c832f3a3b9311c7c6bfadbc950da5238cf5c0ca23
-
SSDEEP
24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYx:Fo0c++OCokGs9Fa+rd1f26RNYx
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Signatures
-
NetWire RAT payload 12 IoCs
resource yara_rule behavioral1/memory/2480-0-0x0000000000D60000-0x0000000000ECB000-memory.dmp netwire behavioral1/files/0x000a000000012286-3.dat netwire behavioral1/memory/2944-24-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2480-41-0x0000000000D60000-0x0000000000ECB000-memory.dmp netwire behavioral1/files/0x0007000000015fa5-47.dat netwire behavioral1/memory/832-49-0x00000000011B0000-0x000000000131B000-memory.dmp netwire behavioral1/memory/832-78-0x00000000011B0000-0x000000000131B000-memory.dmp netwire behavioral1/memory/2856-79-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2428-86-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2856-88-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/1488-113-0x00000000011B0000-0x000000000131B000-memory.dmp netwire behavioral1/memory/2808-153-0x00000000011B0000-0x000000000131B000-memory.dmp netwire -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1844-39-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat behavioral1/memory/1844-29-0x0000000000080000-0x000000000009D000-memory.dmp warzonerat -
Executes dropped EXE 11 IoCs
pid Process 2944 Blasthost.exe 2856 Host.exe 832 RtDCpl64.exe 2428 Blasthost.exe 2664 RtDCpl64.exe 1488 RtDCpl64.exe 2016 Blasthost.exe 1140 RtDCpl64.exe 2808 RtDCpl64.exe 2868 RtDCpl64.exe 2604 Blasthost.exe -
Loads dropped DLL 16 IoCs
pid Process 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 2944 Blasthost.exe 2944 Blasthost.exe 832 RtDCpl64.exe 832 RtDCpl64.exe 832 RtDCpl64.exe 832 RtDCpl64.exe 1488 RtDCpl64.exe 1488 RtDCpl64.exe 1488 RtDCpl64.exe 2808 RtDCpl64.exe 2808 RtDCpl64.exe 2808 RtDCpl64.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2480-0-0x0000000000D60000-0x0000000000ECB000-memory.dmp autoit_exe behavioral1/memory/2480-41-0x0000000000D60000-0x0000000000ECB000-memory.dmp autoit_exe behavioral1/files/0x0007000000015fa5-47.dat autoit_exe behavioral1/memory/832-49-0x00000000011B0000-0x000000000131B000-memory.dmp autoit_exe behavioral1/memory/832-78-0x00000000011B0000-0x000000000131B000-memory.dmp autoit_exe behavioral1/memory/1488-113-0x00000000011B0000-0x000000000131B000-memory.dmp autoit_exe behavioral1/memory/2808-153-0x00000000011B0000-0x000000000131B000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2480 set thread context of 1844 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 32 PID 832 set thread context of 2664 832 RtDCpl64.exe 40 PID 1488 set thread context of 1140 1488 RtDCpl64.exe 48 PID 2808 set thread context of 2868 2808 RtDCpl64.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Blasthost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RtDCpl64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2628 schtasks.exe 1732 schtasks.exe 1564 schtasks.exe 2652 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2944 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 30 PID 2480 wrote to memory of 2944 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 30 PID 2480 wrote to memory of 2944 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 30 PID 2480 wrote to memory of 2944 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 30 PID 2944 wrote to memory of 2856 2944 Blasthost.exe 31 PID 2944 wrote to memory of 2856 2944 Blasthost.exe 31 PID 2944 wrote to memory of 2856 2944 Blasthost.exe 31 PID 2944 wrote to memory of 2856 2944 Blasthost.exe 31 PID 2480 wrote to memory of 1844 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 32 PID 2480 wrote to memory of 1844 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 32 PID 2480 wrote to memory of 1844 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 32 PID 2480 wrote to memory of 1844 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 32 PID 2480 wrote to memory of 1844 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 32 PID 2480 wrote to memory of 1844 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 32 PID 2480 wrote to memory of 2628 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 33 PID 2480 wrote to memory of 2628 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 33 PID 2480 wrote to memory of 2628 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 33 PID 2480 wrote to memory of 2628 2480 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 33 PID 1844 wrote to memory of 2660 1844 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 34 PID 1844 wrote to memory of 2660 1844 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 34 PID 1844 wrote to memory of 2660 1844 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 34 PID 1844 wrote to memory of 2660 1844 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 34 PID 1844 wrote to memory of 2660 1844 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 34 PID 1844 wrote to memory of 2660 1844 538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe 34 PID 1504 wrote to memory of 832 1504 taskeng.exe 38 PID 1504 wrote to memory of 832 1504 taskeng.exe 38 PID 1504 wrote to memory of 832 1504 taskeng.exe 38 PID 1504 wrote to memory of 832 1504 taskeng.exe 38 PID 832 wrote to memory of 2428 832 RtDCpl64.exe 39 PID 832 wrote to memory of 2428 832 RtDCpl64.exe 39 PID 832 wrote to memory of 2428 832 RtDCpl64.exe 39 PID 832 wrote to memory of 2428 832 RtDCpl64.exe 39 PID 832 wrote to memory of 2664 832 RtDCpl64.exe 40 PID 832 wrote to memory of 2664 832 RtDCpl64.exe 40 PID 832 wrote to memory of 2664 832 RtDCpl64.exe 40 PID 832 wrote to memory of 2664 832 RtDCpl64.exe 40 PID 832 wrote to memory of 2664 832 RtDCpl64.exe 40 PID 832 wrote to memory of 2664 832 RtDCpl64.exe 40 PID 832 wrote to memory of 1732 832 RtDCpl64.exe 41 PID 832 wrote to memory of 1732 832 RtDCpl64.exe 41 PID 832 wrote to memory of 1732 832 RtDCpl64.exe 41 PID 832 wrote to memory of 1732 832 RtDCpl64.exe 41 PID 2664 wrote to memory of 1792 2664 RtDCpl64.exe 43 PID 2664 wrote to memory of 1792 2664 RtDCpl64.exe 43 PID 2664 wrote to memory of 1792 2664 RtDCpl64.exe 43 PID 2664 wrote to memory of 1792 2664 RtDCpl64.exe 43 PID 2664 wrote to memory of 1792 2664 RtDCpl64.exe 43 PID 2664 wrote to memory of 1792 2664 RtDCpl64.exe 43 PID 1504 wrote to memory of 1488 1504 taskeng.exe 46 PID 1504 wrote to memory of 1488 1504 taskeng.exe 46 PID 1504 wrote to memory of 1488 1504 taskeng.exe 46 PID 1504 wrote to memory of 1488 1504 taskeng.exe 46 PID 1488 wrote to memory of 2016 1488 RtDCpl64.exe 47 PID 1488 wrote to memory of 2016 1488 RtDCpl64.exe 47 PID 1488 wrote to memory of 2016 1488 RtDCpl64.exe 47 PID 1488 wrote to memory of 2016 1488 RtDCpl64.exe 47 PID 1488 wrote to memory of 1140 1488 RtDCpl64.exe 48 PID 1488 wrote to memory of 1140 1488 RtDCpl64.exe 48 PID 1488 wrote to memory of 1140 1488 RtDCpl64.exe 48 PID 1488 wrote to memory of 1140 1488 RtDCpl64.exe 48 PID 1488 wrote to memory of 1140 1488 RtDCpl64.exe 48 PID 1488 wrote to memory of 1140 1488 RtDCpl64.exe 48 PID 1488 wrote to memory of 1564 1488 RtDCpl64.exe 49 PID 1488 wrote to memory of 1564 1488 RtDCpl64.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe"C:\Users\Admin\AppData\Local\Temp\538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"3⤵
- Executes dropped EXE
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe"C:\Users\Admin\AppData\Local\Temp\538e14a9d98e52d7bb890f273837c08b7c26d7a03ff33059a38eb3bfef789e1e.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2628
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A6E4266F-F7BC-4731-9059-A262F0657EE3} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:2428
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1732
-
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:2016
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1564
-
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exeC:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Users\Admin\AppData\Roaming\Blasthost.exe"C:\Users\Admin\AppData\Roaming\Blasthost.exe"3⤵
- Executes dropped EXE
PID:2604
-
-
C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5352c9ecdb4d6200821e0831c2c38b3d4
SHA11c7de9cdbe8b07e00c95d71f7a8965233be9fcf5
SHA256da20de29dfdf6abceab269d1209b1696b002689422e43d07610f32882cd73297
SHA512068a03fa06ec39d33b9e73fdd1c3f7be706a3803c141249bdd6ef69b129f49f3fa9c82be93286c1870f91acdeff584e6c8d08650c0b170f72ea2014a7c487f69
-
Filesize
132KB
MD56087bf6af59b9c531f2c9bb421d5e902
SHA18bc0f1596c986179b82585c703bacae6d2a00316
SHA2563a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c
SHA512c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292