Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2024 09:35

General

  • Target

    1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe

  • Size

    8.2MB

  • MD5

    1b6f9f0f8009139a81698cda6e140700

  • SHA1

    dd575d166428d7fca33b522914846d09f167b5e9

  • SHA256

    1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8

  • SHA512

    b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8X

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
    "C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe
      "C:\Users\Admin\AppData\Local\Temp\1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2676
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1524
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2972
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:772
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1100
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1532
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2464
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1492
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2964
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:824
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2304
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:544
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2732
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1828
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:880
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1148
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:2836
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2656

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        1b6f9f0f8009139a81698cda6e140700

        SHA1

        dd575d166428d7fca33b522914846d09f167b5e9

        SHA256

        1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8

        SHA512

        b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        73f2b8654797e1fcb509f1a1100f0d62

        SHA1

        5f14ccf42245adc1a41ed503e08fcba71b9e2385

        SHA256

        3a0ff12213a27d2b21ac59044fd74daf3c618691f077c19e92009c59736ee326

        SHA512

        9c079c228a4f6a4e9c6b7b9737767ac5072a079e57bbec35681e345553196d4f41f375c51c878c1784c841e5335f8a1b3746844d2eac533290014ea12658d22b

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        b9c188ea7b91f18a1249231827e4a66a

        SHA1

        4580c04c1c5854b4a43569675b22db661bdf1aff

        SHA256

        922a2c5c39d7f6d1f5969dd1f72ddff2fa268dd5c65774aa7f009a4a391fce10

        SHA512

        8a71edc15ad32d374f89883a72aed4499f5b6a34869e1bd9b7e7d0e8f59583e701e0b16c7aa9cc34bdc57b98f230d2255cbdc18866f1716a60fbbb7c224ae5b8

      • memory/772-140-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/772-100-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/772-101-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/772-99-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1100-121-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1100-113-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1524-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1524-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1524-91-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1524-51-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1524-57-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1524-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2304-169-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2464-130-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2656-38-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2656-30-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2656-39-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2656-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2656-26-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2676-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2676-18-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2676-56-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2676-49-0x0000000003130000-0x0000000003244000-memory.dmp

        Filesize

        1.1MB

      • memory/2676-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2676-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2676-33-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2836-81-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2952-3-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2952-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2952-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2952-21-0x0000000003200000-0x0000000003314000-memory.dmp

        Filesize

        1.1MB

      • memory/2952-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2952-36-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2952-6-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2952-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2964-152-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2972-137-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2972-141-0x0000000003170000-0x0000000003284000-memory.dmp

        Filesize

        1.1MB

      • memory/2972-139-0x0000000003170000-0x0000000003284000-memory.dmp

        Filesize

        1.1MB

      • memory/2972-151-0x0000000003170000-0x0000000003284000-memory.dmp

        Filesize

        1.1MB

      • memory/2972-112-0x0000000003170000-0x0000000003284000-memory.dmp

        Filesize

        1.1MB

      • memory/2972-177-0x0000000003170000-0x0000000003284000-memory.dmp

        Filesize

        1.1MB