Analysis

  • max time kernel
    119s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2024 07:14

General

  • Target

    c4f5bb72347c9d34250652b1316c4b4ad943d174d30c7b049525d172ebb27bc7N.exe

  • Size

    8.2MB

  • MD5

    d7404aebb2a9341fa26898f87b622220

  • SHA1

    0c467caf2ec6fcc6b74247fad9e47970ffe793f4

  • SHA256

    c4f5bb72347c9d34250652b1316c4b4ad943d174d30c7b049525d172ebb27bc7

  • SHA512

    9bce78fc38831e87cdd2a2eb254139885b51627d895b251f872339fa554340b356b5c4ae6dd8290961be623251245fa439038625935637f60c10b7c2e48ae223

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecc:V8e8e8f8e8e8J

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 7 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 7 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 42 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4f5bb72347c9d34250652b1316c4b4ad943d174d30c7b049525d172ebb27bc7N.exe
    "C:\Users\Admin\AppData\Local\Temp\c4f5bb72347c9d34250652b1316c4b4ad943d174d30c7b049525d172ebb27bc7N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Local\Temp\c4f5bb72347c9d34250652b1316c4b4ad943d174d30c7b049525d172ebb27bc7N.exe
      "C:\Users\Admin\AppData\Local\Temp\c4f5bb72347c9d34250652b1316c4b4ad943d174d30c7b049525d172ebb27bc7N.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2676
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:428
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2296
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2444
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1396
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1928
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:552
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1980
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3056
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1788
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2540
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2584
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2280
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 36
              6⤵
              • Program crash
              PID:1552
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:296
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:932

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        d7404aebb2a9341fa26898f87b622220

        SHA1

        0c467caf2ec6fcc6b74247fad9e47970ffe793f4

        SHA256

        c4f5bb72347c9d34250652b1316c4b4ad943d174d30c7b049525d172ebb27bc7

        SHA512

        9bce78fc38831e87cdd2a2eb254139885b51627d895b251f872339fa554340b356b5c4ae6dd8290961be623251245fa439038625935637f60c10b7c2e48ae223

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        fdbbb5119b7d950298e245be8f7f7006

        SHA1

        2b78decd6c9da1eb6b0228b9652149239fe3dc5a

        SHA256

        f1b9e34801097c87b3a111c12ee16bf3b732d5b3a5052c7703925b6abdce5748

        SHA512

        6a2451d7a3eba2e5827fb51a2934773f54117a479c59af7fb40fb3b966f9a706c3a84f1968d30a8f669cf46a5e1e62aa9bba0b44e67291ab254b16c96f2035a1

      • C:\Windows\system\spoolsv.exe

        Filesize

        4.0MB

        MD5

        b6b88b4dc724c7db814c130be6093d74

        SHA1

        4c4ab64282672192578bc71864b0944bbe0de2a5

        SHA256

        93b155efd99a7a46d4b2cc629a34084eb9b2372b4eeb65b18125e454e29bd805

        SHA512

        5565b6fce323e3a66652373e17b853591642e1fcd59b9fb8974df5774713e0632997aa858813dab6f03e9b2b43533946d956889cea8b31e9d610d0f9d07a40b2

      • \Windows\system\spoolsv.exe

        Filesize

        4.8MB

        MD5

        3cfa1f0bf4409d52fcc30f52833c0a1a

        SHA1

        82ab0b1a15835bbe2f1e5694410e4157a56346eb

        SHA256

        6a40c7e5f1ad2cdc15d6baf11ecbfa12a4202124c19b230d188340d18eb9348a

        SHA512

        d7b52b86d048c9b8fb162cb11d899f3a43cf89a318bdf95e2f7d09f7a421cea728de8f2574b06eaf7362f2ca782ff78b1e5625f14492d0d0e12c774465171e0b

      • \Windows\system\spoolsv.exe

        Filesize

        3.9MB

        MD5

        8ff61a6c3dc66fb81366321b63e9fa25

        SHA1

        2e06ed82497cae8bdd32bf9771d0734fde65e306

        SHA256

        bbd6d2fffcb1dd2d618bfacafd835f419a41cebc236a12c7edc88569d7aee5f8

        SHA512

        ae8f250cf3a4dd43f501c081fa188417e9f6a7c71d4ff77b79648cf737de2da3a7c846cd1081a37d8337df1126c5b219d527bfc89383b3c4080c85cacd1da963

      • \Windows\system\spoolsv.exe

        Filesize

        64KB

        MD5

        0c20e4c2a92d86dd2c7941c4f72ac6a4

        SHA1

        2353f110afd2a77720660182fb1f5db63bac235a

        SHA256

        d5f0b0632aff0655ff34d29303ed6b1f3b8dbfb40e9ff7a12b3112ce010df09e

        SHA512

        a2bdd934abbf1d97c0bda8af808460b6cc486c73d88a6add989cb91238635061c9eaf93d15831b535c37541d8c195a7d1cbcba67d47a671bfb2658f69beebfe9

      • \Windows\system\spoolsv.exe

        Filesize

        960KB

        MD5

        f854c8aaca73b8cb3437a362c19e47e7

        SHA1

        c064dc736e443565015fb37b1e172f2f132a3a89

        SHA256

        4ee9ecf1d2f516310d71c4fae8e5350b6bbc4e6188ecb7df891a5ff8bede184c

        SHA512

        ae0ae3affd304efafab626f0efd8a2fd05e92ebb5431ddeb28b25a3bab8eb0d1070142c22da882d2f0b703a7cf5163101776af14304511235090c7259446c842

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        3dec55570842e06f6bf4f5d5ba1f82e0

        SHA1

        7fc4ace5f528e0433ec0d2ba1dd04922aff5a844

        SHA256

        822180172620071f2dfc953946dcf185552c78a295f948d024e6c105461a222e

        SHA512

        fe11aa8c150fa9420ba722deeac48589b9ad201ca6d65f1af5640ae8a11ccb01e3071832f847383c092928d1e0be869921654bb186a96ead249e551e7fdeeb74

      • memory/296-80-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/428-88-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/428-49-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/428-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/428-48-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/428-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/932-31-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/932-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/932-36-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/932-35-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/932-27-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1396-125-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1396-113-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2280-189-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2296-150-0x0000000002DE0000-0x0000000002EF4000-memory.dmp

        Filesize

        1.1MB

      • memory/2296-170-0x0000000002DE0000-0x0000000002EF4000-memory.dmp

        Filesize

        1.1MB

      • memory/2296-154-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2296-152-0x0000000002DE0000-0x0000000002EF4000-memory.dmp

        Filesize

        1.1MB

      • memory/2296-133-0x0000000002DE0000-0x0000000002EF4000-memory.dmp

        Filesize

        1.1MB

      • memory/2296-134-0x0000000002DE0000-0x0000000002EF4000-memory.dmp

        Filesize

        1.1MB

      • memory/2296-120-0x0000000002CE0000-0x0000000002DF4000-memory.dmp

        Filesize

        1.1MB

      • memory/2296-112-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2296-97-0x0000000002CE0000-0x0000000002DF4000-memory.dmp

        Filesize

        1.1MB

      • memory/2444-122-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2444-100-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2444-101-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2444-99-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2676-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2676-22-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2676-50-0x0000000002E40000-0x0000000002F54000-memory.dmp

        Filesize

        1.1MB

      • memory/2676-23-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2676-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2676-51-0x0000000002E40000-0x0000000002F54000-memory.dmp

        Filesize

        1.1MB

      • memory/2676-55-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2676-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2728-38-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2728-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2728-6-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/2728-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2728-3-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/2728-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2728-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/3056-153-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB