Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
8ee60423bc1f9d704f96b7806b39819a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ee60423bc1f9d704f96b7806b39819a.exe
Resource
win10v2004-20241007-en
General
-
Target
8ee60423bc1f9d704f96b7806b39819a.exe
-
Size
322KB
-
MD5
909737a0a11765901cdce436737ac172
-
SHA1
00d77473c837e0ed2887d6285a6c3c9e47ec83c8
-
SHA256
39cd390039e7ad850abd64cfc0b387c77470153c09d35108cf96a893185804a2
-
SHA512
e0989e9178201f126cc600b2d64c3609ff58f7ee3ab55f177fd7301f32cf13322afe7fdbe7334c52892ffc4f5b193fb38d841371c196ac44341bd54211dab2a2
-
SSDEEP
6144:+vMt6V/hdmkcyvAIFtUx2yTF5vdzfaiWKBilS70e8mZC9TbUcuJJCoED:EMtehrcyvAI8MyT3lfjyS70e84QEO1D
Malware Config
Extracted
warzonerat
tobi12345.hopto.org:50501
Signatures
-
Bazaloader family
-
Detects BazaLoader malware 2 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests - JaffaCakes118.
resource yara_rule behavioral2/memory/228-1940-0x0000000000400000-0x000000000055E000-memory.dmp BazaLoader behavioral2/memory/228-1949-0x0000000000400000-0x000000000055E000-memory.dmp BazaLoader -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral2/memory/228-1940-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/228-1949-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start 8ee60423bc1f9d704f96b7806b39819a.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat 8ee60423bc1f9d704f96b7806b39819a.exe -
Executes dropped EXE 2 IoCs
pid Process 5148 win32.exe 5936 win32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 336 set thread context of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 5148 set thread context of 5936 5148 win32.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ee60423bc1f9d704f96b7806b39819a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ee60423bc1f9d704f96b7806b39819a.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\ProgramData:ApplicationData 8ee60423bc1f9d704f96b7806b39819a.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 336 8ee60423bc1f9d704f96b7806b39819a.exe 336 8ee60423bc1f9d704f96b7806b39819a.exe 336 8ee60423bc1f9d704f96b7806b39819a.exe 336 8ee60423bc1f9d704f96b7806b39819a.exe 336 8ee60423bc1f9d704f96b7806b39819a.exe 336 8ee60423bc1f9d704f96b7806b39819a.exe 336 8ee60423bc1f9d704f96b7806b39819a.exe 336 8ee60423bc1f9d704f96b7806b39819a.exe 336 8ee60423bc1f9d704f96b7806b39819a.exe 336 8ee60423bc1f9d704f96b7806b39819a.exe 5148 win32.exe 5148 win32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 336 8ee60423bc1f9d704f96b7806b39819a.exe Token: SeDebugPrivilege 5148 win32.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 336 wrote to memory of 1816 336 8ee60423bc1f9d704f96b7806b39819a.exe 95 PID 336 wrote to memory of 1816 336 8ee60423bc1f9d704f96b7806b39819a.exe 95 PID 336 wrote to memory of 1816 336 8ee60423bc1f9d704f96b7806b39819a.exe 95 PID 336 wrote to memory of 4408 336 8ee60423bc1f9d704f96b7806b39819a.exe 96 PID 336 wrote to memory of 4408 336 8ee60423bc1f9d704f96b7806b39819a.exe 96 PID 336 wrote to memory of 4408 336 8ee60423bc1f9d704f96b7806b39819a.exe 96 PID 336 wrote to memory of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 336 wrote to memory of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 336 wrote to memory of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 336 wrote to memory of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 336 wrote to memory of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 336 wrote to memory of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 336 wrote to memory of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 336 wrote to memory of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 336 wrote to memory of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 336 wrote to memory of 228 336 8ee60423bc1f9d704f96b7806b39819a.exe 97 PID 228 wrote to memory of 5132 228 8ee60423bc1f9d704f96b7806b39819a.exe 98 PID 228 wrote to memory of 5132 228 8ee60423bc1f9d704f96b7806b39819a.exe 98 PID 228 wrote to memory of 5132 228 8ee60423bc1f9d704f96b7806b39819a.exe 98 PID 228 wrote to memory of 5148 228 8ee60423bc1f9d704f96b7806b39819a.exe 99 PID 228 wrote to memory of 5148 228 8ee60423bc1f9d704f96b7806b39819a.exe 99 PID 228 wrote to memory of 5148 228 8ee60423bc1f9d704f96b7806b39819a.exe 99 PID 5132 wrote to memory of 5400 5132 cmd.exe 101 PID 5132 wrote to memory of 5400 5132 cmd.exe 101 PID 5132 wrote to memory of 5400 5132 cmd.exe 101 PID 5148 wrote to memory of 5936 5148 win32.exe 105 PID 5148 wrote to memory of 5936 5148 win32.exe 105 PID 5148 wrote to memory of 5936 5148 win32.exe 105 PID 5148 wrote to memory of 5936 5148 win32.exe 105 PID 5148 wrote to memory of 5936 5148 win32.exe 105 PID 5148 wrote to memory of 5936 5148 win32.exe 105 PID 5148 wrote to memory of 5936 5148 win32.exe 105 PID 5148 wrote to memory of 5936 5148 win32.exe 105 PID 5148 wrote to memory of 5936 5148 win32.exe 105 PID 5148 wrote to memory of 5936 5148 win32.exe 105 PID 5936 wrote to memory of 5744 5936 win32.exe 106 PID 5936 wrote to memory of 5744 5936 win32.exe 106 PID 5936 wrote to memory of 5744 5936 win32.exe 106 PID 5936 wrote to memory of 5744 5936 win32.exe 106 PID 5936 wrote to memory of 5744 5936 win32.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ee60423bc1f9d704f96b7806b39819a.exe"C:\Users\Admin\AppData\Local\Temp\8ee60423bc1f9d704f96b7806b39819a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\8ee60423bc1f9d704f96b7806b39819a.exeC:\Users\Admin\AppData\Local\Temp\8ee60423bc1f9d704f96b7806b39819a.exe2⤵PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\8ee60423bc1f9d704f96b7806b39819a.exeC:\Users\Admin\AppData\Local\Temp\8ee60423bc1f9d704f96b7806b39819a.exe2⤵PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\8ee60423bc1f9d704f96b7806b39819a.exeC:\Users\Admin\AppData\Local\Temp\8ee60423bc1f9d704f96b7806b39819a.exe2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\win32.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5132 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\win32.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5400
-
-
-
C:\ProgramData\win32.exe"C:\ProgramData\win32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5148 -
C:\Users\Admin\AppData\Local\Temp\win32.exeC:\Users\Admin\AppData\Local\Temp\win32.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5936 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5744
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD5909737a0a11765901cdce436737ac172
SHA100d77473c837e0ed2887d6285a6c3c9e47ec83c8
SHA25639cd390039e7ad850abd64cfc0b387c77470153c09d35108cf96a893185804a2
SHA512e0989e9178201f126cc600b2d64c3609ff58f7ee3ab55f177fd7301f32cf13322afe7fdbe7334c52892ffc4f5b193fb38d841371c196ac44341bd54211dab2a2