Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 14:36

General

  • Target

    3f8a2f599a854d6327c9f816a7272685bfc5813a6e2ed9a83e5ed227eb148bb5N.exe

  • Size

    8.2MB

  • MD5

    bf0df2193b73a2fe2f71d103822cc550

  • SHA1

    40fa08e2c45fa03547d305ef7a59462aa141c5e1

  • SHA256

    3f8a2f599a854d6327c9f816a7272685bfc5813a6e2ed9a83e5ed227eb148bb5

  • SHA512

    47a0b95f1dd1931a9eaf98c9c503247fcda2871892d2aa8f88d00ac4255e3a778660e0926aa94f5b76e350145080b1fa471db31796869543539646b237a8f283

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNec2:V8e8e8f8e8e83

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f8a2f599a854d6327c9f816a7272685bfc5813a6e2ed9a83e5ed227eb148bb5N.exe
    "C:\Users\Admin\AppData\Local\Temp\3f8a2f599a854d6327c9f816a7272685bfc5813a6e2ed9a83e5ed227eb148bb5N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\3f8a2f599a854d6327c9f816a7272685bfc5813a6e2ed9a83e5ed227eb148bb5N.exe
      "C:\Users\Admin\AppData\Local\Temp\3f8a2f599a854d6327c9f816a7272685bfc5813a6e2ed9a83e5ed227eb148bb5N.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2756
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2652
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1976
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1820
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3040
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2136
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:448
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1092
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1580
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:308
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:768
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2560
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2360
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1824
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1600
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:872
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:616
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2336

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        bf0df2193b73a2fe2f71d103822cc550

        SHA1

        40fa08e2c45fa03547d305ef7a59462aa141c5e1

        SHA256

        3f8a2f599a854d6327c9f816a7272685bfc5813a6e2ed9a83e5ed227eb148bb5

        SHA512

        47a0b95f1dd1931a9eaf98c9c503247fcda2871892d2aa8f88d00ac4255e3a778660e0926aa94f5b76e350145080b1fa471db31796869543539646b237a8f283

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        bcd3ff3ddc6dbe8a900c7f76790cfd84

        SHA1

        ff8b95402ab26faadd7f35efb6a501d62c374752

        SHA256

        359d83d5e346efb0bd91b6397d44ea8d1a860bfbadcef9e609688602c77d9cea

        SHA512

        cf9fd546e6595b5264c8156a36264b778ef53e689749c344e02b99bbc44f4fc599913ccd1e76e2af0ca45858d904c01307c7be002cb7aaae636936fd1e144fe7

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        33529a3b4970ee27be5152407cd26295

        SHA1

        fe1c92838bc1316adb0bd934eb21fd00b8e4b885

        SHA256

        1e6b16585eacc4ef157be4cf8bb402036fd9efd59f9a0820b160373eae9874c5

        SHA512

        b3ebda01714c37d3a5503cdf3f8d93fbb71fcc80b73a9a2297cb2121b23247c6ea8b4aec98e05436e051eb0d358f8d1f1132922d2f8f1db185c022f1ae4fe50f

      • memory/768-172-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1580-156-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1820-104-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1820-135-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1820-105-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1820-103-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1976-133-0x00000000031E0000-0x00000000032F4000-memory.dmp

        Filesize

        1.1MB

      • memory/1976-134-0x00000000031E0000-0x00000000032F4000-memory.dmp

        Filesize

        1.1MB

      • memory/1976-125-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1976-111-0x00000000031E0000-0x00000000032F4000-memory.dmp

        Filesize

        1.1MB

      • memory/1976-144-0x00000000031E0000-0x00000000032F4000-memory.dmp

        Filesize

        1.1MB

      • memory/1976-97-0x00000000031E0000-0x00000000032F4000-memory.dmp

        Filesize

        1.1MB

      • memory/1976-145-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1976-150-0x00000000031E0000-0x00000000032F4000-memory.dmp

        Filesize

        1.1MB

      • memory/2336-33-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2336-43-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2336-42-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2336-37-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2336-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2400-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2400-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2400-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2400-3-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/2400-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2400-6-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/2400-40-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2400-22-0x0000000003180000-0x0000000003294000-memory.dmp

        Filesize

        1.1MB

      • memory/2652-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2652-88-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2652-56-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2652-55-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2652-51-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2756-54-0x0000000003170000-0x0000000003284000-memory.dmp

        Filesize

        1.1MB

      • memory/2756-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-53-0x0000000003170000-0x0000000003284000-memory.dmp

        Filesize

        1.1MB

      • memory/2756-28-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-59-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-26-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/3040-117-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB