Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 19:06
Behavioral task
behavioral1
Sample
fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe
Resource
win10v2004-20241007-en
General
-
Target
fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe
-
Size
3.9MB
-
MD5
5309c3f6de55185dedb1c353afa27c80
-
SHA1
d181c03c655ad31440248ebb398a91c35defed39
-
SHA256
fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583
-
SHA512
0c10ac905296f1a360c2d48b13669bc9dd6f3c1d4e7b8bce495e29e69c137204bcf946935336629b14a539c782320e995313bba2c59af31b350f810bcda6dca9
-
SSDEEP
24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDW:7C0bNechC0bNechC0bNecO
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000016c51-49.dat warzonerat behavioral1/files/0x0008000000016c3a-77.dat warzonerat behavioral1/files/0x0008000000016cc8-97.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0009000000016c51-49.dat aspack_v212_v242 behavioral1/files/0x0008000000016c3a-77.dat aspack_v212_v242 behavioral1/files/0x0008000000016cc8-97.dat aspack_v212_v242 -
Executes dropped EXE 9 IoCs
pid Process 2732 explorer.exe 2972 explorer.exe 1536 spoolsv.exe 1728 spoolsv.exe 944 spoolsv.exe 2472 spoolsv.exe 2160 spoolsv.exe 2436 spoolsv.exe 2376 spoolsv.exe -
Loads dropped DLL 58 IoCs
pid Process 2728 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 2728 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2944 WerFault.exe 2944 WerFault.exe 2944 WerFault.exe 2944 WerFault.exe 2944 WerFault.exe 2944 WerFault.exe 2944 WerFault.exe 2972 explorer.exe 2972 explorer.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 2972 explorer.exe 2972 explorer.exe 876 WerFault.exe 876 WerFault.exe 876 WerFault.exe 876 WerFault.exe 876 WerFault.exe 876 WerFault.exe 876 WerFault.exe 2972 explorer.exe 2972 explorer.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 700 WerFault.exe 2972 explorer.exe 2972 explorer.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 1428 WerFault.exe 2972 explorer.exe 2972 explorer.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 236 set thread context of 2728 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 31 PID 236 set thread context of 2828 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 32 PID 2732 set thread context of 2972 2732 explorer.exe 34 PID 2732 set thread context of 1856 2732 explorer.exe 35 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2944 1728 WerFault.exe 37 1880 944 WerFault.exe 39 876 2472 WerFault.exe 41 700 2160 WerFault.exe 43 1428 2436 WerFault.exe 45 320 2376 WerFault.exe 47 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2728 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 2728 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe 2972 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 236 wrote to memory of 2728 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 31 PID 236 wrote to memory of 2728 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 31 PID 236 wrote to memory of 2728 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 31 PID 236 wrote to memory of 2728 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 31 PID 236 wrote to memory of 2728 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 31 PID 236 wrote to memory of 2728 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 31 PID 236 wrote to memory of 2728 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 31 PID 236 wrote to memory of 2728 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 31 PID 236 wrote to memory of 2728 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 31 PID 236 wrote to memory of 2828 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 32 PID 236 wrote to memory of 2828 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 32 PID 236 wrote to memory of 2828 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 32 PID 236 wrote to memory of 2828 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 32 PID 236 wrote to memory of 2828 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 32 PID 236 wrote to memory of 2828 236 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 32 PID 2728 wrote to memory of 2732 2728 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 33 PID 2728 wrote to memory of 2732 2728 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 33 PID 2728 wrote to memory of 2732 2728 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 33 PID 2728 wrote to memory of 2732 2728 fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe 33 PID 2732 wrote to memory of 2972 2732 explorer.exe 34 PID 2732 wrote to memory of 2972 2732 explorer.exe 34 PID 2732 wrote to memory of 2972 2732 explorer.exe 34 PID 2732 wrote to memory of 2972 2732 explorer.exe 34 PID 2732 wrote to memory of 2972 2732 explorer.exe 34 PID 2732 wrote to memory of 2972 2732 explorer.exe 34 PID 2732 wrote to memory of 2972 2732 explorer.exe 34 PID 2732 wrote to memory of 2972 2732 explorer.exe 34 PID 2732 wrote to memory of 2972 2732 explorer.exe 34 PID 2732 wrote to memory of 1856 2732 explorer.exe 35 PID 2732 wrote to memory of 1856 2732 explorer.exe 35 PID 2732 wrote to memory of 1856 2732 explorer.exe 35 PID 2732 wrote to memory of 1856 2732 explorer.exe 35 PID 2732 wrote to memory of 1856 2732 explorer.exe 35 PID 2732 wrote to memory of 1856 2732 explorer.exe 35 PID 2972 wrote to memory of 1536 2972 explorer.exe 36 PID 2972 wrote to memory of 1536 2972 explorer.exe 36 PID 2972 wrote to memory of 1536 2972 explorer.exe 36 PID 2972 wrote to memory of 1536 2972 explorer.exe 36 PID 2972 wrote to memory of 1728 2972 explorer.exe 37 PID 2972 wrote to memory of 1728 2972 explorer.exe 37 PID 2972 wrote to memory of 1728 2972 explorer.exe 37 PID 2972 wrote to memory of 1728 2972 explorer.exe 37 PID 1728 wrote to memory of 2944 1728 spoolsv.exe 38 PID 1728 wrote to memory of 2944 1728 spoolsv.exe 38 PID 1728 wrote to memory of 2944 1728 spoolsv.exe 38 PID 1728 wrote to memory of 2944 1728 spoolsv.exe 38 PID 2972 wrote to memory of 944 2972 explorer.exe 39 PID 2972 wrote to memory of 944 2972 explorer.exe 39 PID 2972 wrote to memory of 944 2972 explorer.exe 39 PID 2972 wrote to memory of 944 2972 explorer.exe 39 PID 944 wrote to memory of 1880 944 spoolsv.exe 40 PID 944 wrote to memory of 1880 944 spoolsv.exe 40 PID 944 wrote to memory of 1880 944 spoolsv.exe 40 PID 944 wrote to memory of 1880 944 spoolsv.exe 40 PID 2972 wrote to memory of 2472 2972 explorer.exe 41 PID 2972 wrote to memory of 2472 2972 explorer.exe 41 PID 2972 wrote to memory of 2472 2972 explorer.exe 41 PID 2972 wrote to memory of 2472 2972 explorer.exe 41 PID 2472 wrote to memory of 876 2472 spoolsv.exe 42 PID 2472 wrote to memory of 876 2472 spoolsv.exe 42 PID 2472 wrote to memory of 876 2472 spoolsv.exe 42 PID 2472 wrote to memory of 876 2472 spoolsv.exe 42 PID 2972 wrote to memory of 2160 2972 explorer.exe 43 PID 2972 wrote to memory of 2160 2972 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe"C:\Users\Admin\AppData\Local\Temp\fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe"C:\Users\Admin\AppData\Local\Temp\fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1536
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1880
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 366⤵
- Loads dropped DLL
- Program crash
PID:876
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 366⤵
- Loads dropped DLL
- Program crash
PID:700
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1428
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 366⤵
- Loads dropped DLL
- Program crash
PID:320
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1856
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD55309c3f6de55185dedb1c353afa27c80
SHA1d181c03c655ad31440248ebb398a91c35defed39
SHA256fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583
SHA5120c10ac905296f1a360c2d48b13669bc9dd6f3c1d4e7b8bce495e29e69c137204bcf946935336629b14a539c782320e995313bba2c59af31b350f810bcda6dca9
-
Filesize
3.9MB
MD55bb894fcf1f96bb025b5b261a6356827
SHA1f9cd70adc06d912fb5178e3a0c5bb87ce1a0dab8
SHA25663405ff61a8535da3a37bef1f64abe169db351aa9879c8b8acdc0eab8d5d6544
SHA512f7265051d052a75e849e1a55eb3f04344364bf5e601a7468f09ce2e15a175c8f92860f37aa858fe9d9ca3a1b147c0f8b08d4d60d9d946cb810a3ac99f6edfd98
-
Filesize
3.9MB
MD5abfbf90c8f336be6054dc796cf58bd14
SHA13fe39e1a9e51254497f099d3f70f78df5135afda
SHA256c164723d0fcde983ad847c090ff7103c45e25b8dff97a21b6b94411236cb770b
SHA51202b61c42f5305bd52f57388ddb3b5844c547b2e03177071a8361ab230bb0a2f16311ca340a326679313f6ce3662c679a31982a6f276d9423c42f1a204521a162