Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-10-2024 06:42
Behavioral task
behavioral1
Sample
2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe
Resource
win10v2004-20241007-en
General
-
Target
2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe
-
Size
8.2MB
-
MD5
6cbf98c1158d231addc657759cf75540
-
SHA1
86e2108ebc489b13b4971103382954a0042bee55
-
SHA256
2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75
-
SHA512
a0d25d81be2ee7709a84d0a56f5b34c8a256bb2d3ae7b025e547a3ea6c8f02c38882ead9113928f2c50fbd02c973ab2d69b175df794edce2afca13080fe0a764
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecv:V8e8e8f8e8e8I
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2476-24-0x0000000002CE0000-0x0000000002DF4000-memory.dmp warzonerat C:\Windows\system\explorer.exe warzonerat C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe warzonerat \Windows\system\spoolsv.exe warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Processes:
resource yara_rule C:\Windows\system\explorer.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe aspack_v212_v242 \Windows\system\spoolsv.exe aspack_v212_v242 -
Executes dropped EXE 6 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2212 explorer.exe 2452 explorer.exe 2520 spoolsv.exe 2620 spoolsv.exe 956 spoolsv.exe 2076 spoolsv.exe -
Loads dropped DLL 31 IoCs
Processes:
2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exeexplorer.exeWerFault.exeWerFault.exeWerFault.exepid process 2776 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2776 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2452 explorer.exe 2452 explorer.exe 1088 WerFault.exe 1088 WerFault.exe 1088 WerFault.exe 1088 WerFault.exe 1088 WerFault.exe 1088 WerFault.exe 1088 WerFault.exe 2452 explorer.exe 2452 explorer.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exe2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exeexplorer.exedescription pid process target process PID 2476 set thread context of 2776 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe PID 2476 set thread context of 1876 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe diskperf.exe PID 2212 set thread context of 2452 2212 explorer.exe explorer.exe PID 2212 set thread context of 464 2212 explorer.exe diskperf.exe -
Drops file in Windows directory 3 IoCs
Processes:
2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exeexplorer.exedescription ioc process File opened for modification \??\c:\windows\system\explorer.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2540 2620 WerFault.exe spoolsv.exe 1088 956 WerFault.exe spoolsv.exe 2580 2076 WerFault.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
spoolsv.exespoolsv.exespoolsv.exespoolsv.exe2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exeexplorer.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exeexplorer.exepid process 2776 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exeexplorer.exepid process 2776 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2776 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exeexplorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exedescription pid process target process PID 2476 wrote to memory of 2776 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe PID 2476 wrote to memory of 2776 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe PID 2476 wrote to memory of 2776 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe PID 2476 wrote to memory of 2776 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe PID 2476 wrote to memory of 2776 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe PID 2476 wrote to memory of 2776 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe PID 2476 wrote to memory of 2776 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe PID 2476 wrote to memory of 2776 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe PID 2476 wrote to memory of 2776 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe PID 2476 wrote to memory of 1876 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe diskperf.exe PID 2476 wrote to memory of 1876 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe diskperf.exe PID 2476 wrote to memory of 1876 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe diskperf.exe PID 2476 wrote to memory of 1876 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe diskperf.exe PID 2476 wrote to memory of 1876 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe diskperf.exe PID 2476 wrote to memory of 1876 2476 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe diskperf.exe PID 2776 wrote to memory of 2212 2776 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe explorer.exe PID 2776 wrote to memory of 2212 2776 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe explorer.exe PID 2776 wrote to memory of 2212 2776 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe explorer.exe PID 2776 wrote to memory of 2212 2776 2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe explorer.exe PID 2212 wrote to memory of 2452 2212 explorer.exe explorer.exe PID 2212 wrote to memory of 2452 2212 explorer.exe explorer.exe PID 2212 wrote to memory of 2452 2212 explorer.exe explorer.exe PID 2212 wrote to memory of 2452 2212 explorer.exe explorer.exe PID 2212 wrote to memory of 2452 2212 explorer.exe explorer.exe PID 2212 wrote to memory of 2452 2212 explorer.exe explorer.exe PID 2212 wrote to memory of 2452 2212 explorer.exe explorer.exe PID 2212 wrote to memory of 2452 2212 explorer.exe explorer.exe PID 2212 wrote to memory of 2452 2212 explorer.exe explorer.exe PID 2212 wrote to memory of 464 2212 explorer.exe diskperf.exe PID 2212 wrote to memory of 464 2212 explorer.exe diskperf.exe PID 2212 wrote to memory of 464 2212 explorer.exe diskperf.exe PID 2212 wrote to memory of 464 2212 explorer.exe diskperf.exe PID 2212 wrote to memory of 464 2212 explorer.exe diskperf.exe PID 2212 wrote to memory of 464 2212 explorer.exe diskperf.exe PID 2452 wrote to memory of 2520 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 2520 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 2520 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 2520 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 2620 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 2620 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 2620 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 2620 2452 explorer.exe spoolsv.exe PID 2620 wrote to memory of 2540 2620 spoolsv.exe WerFault.exe PID 2620 wrote to memory of 2540 2620 spoolsv.exe WerFault.exe PID 2620 wrote to memory of 2540 2620 spoolsv.exe WerFault.exe PID 2620 wrote to memory of 2540 2620 spoolsv.exe WerFault.exe PID 2452 wrote to memory of 956 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 956 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 956 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 956 2452 explorer.exe spoolsv.exe PID 956 wrote to memory of 1088 956 spoolsv.exe WerFault.exe PID 956 wrote to memory of 1088 956 spoolsv.exe WerFault.exe PID 956 wrote to memory of 1088 956 spoolsv.exe WerFault.exe PID 956 wrote to memory of 1088 956 spoolsv.exe WerFault.exe PID 2452 wrote to memory of 2076 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 2076 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 2076 2452 explorer.exe spoolsv.exe PID 2452 wrote to memory of 2076 2452 explorer.exe spoolsv.exe PID 2076 wrote to memory of 2580 2076 spoolsv.exe WerFault.exe PID 2076 wrote to memory of 2580 2076 spoolsv.exe WerFault.exe PID 2076 wrote to memory of 2580 2076 spoolsv.exe WerFault.exe PID 2076 wrote to memory of 2580 2076 spoolsv.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe"C:\Users\Admin\AppData\Local\Temp\2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe"C:\Users\Admin\AppData\Local\Temp\2f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2520
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2580
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:464
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD56cbf98c1158d231addc657759cf75540
SHA186e2108ebc489b13b4971103382954a0042bee55
SHA2562f68b99b7e23a3d6f4255a64e0bfbf6c0393716f59892ff248866d56021daa75
SHA512a0d25d81be2ee7709a84d0a56f5b34c8a256bb2d3ae7b025e547a3ea6c8f02c38882ead9113928f2c50fbd02c973ab2d69b175df794edce2afca13080fe0a764
-
Filesize
8.2MB
MD58141e97d6ebace45afbebcefff719a95
SHA158b7eca90b69c756e8e0102bd4fe237ec7459cd0
SHA256447f1225d10e81417a97de12a0ff3c862062f93993a91e77ccd32aa9b18f1602
SHA5124ba2b95579e7304cbb7cd28a6abcdf9b9673d2c47b5713bc7b7782bf9f0aa0164135657f24928d3b3ba91f09816e72cc0641b578415910f16b47ee2f724d7847
-
Filesize
8.2MB
MD5692e69c858dd6bb4c3447911a97ed3b7
SHA15ec7db1c7a45bc0df6704e9d61f1988e9d0d78ad
SHA256445e021053c3e76012628326f9859dde517cacf9001ae2637c8c1c2c1b2f5598
SHA5127a04290982a3043e25e50ac90a4c30775f29a15d0f8c6cb285dbf36c3ba8080466a3911e812d120529a9809b561b4af069d45762e9e183b13c9b87b34aec3de6