Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 02:10
Behavioral task
behavioral1
Sample
200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe
Resource
win10v2004-20241007-en
General
-
Target
200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe
-
Size
8.2MB
-
MD5
c0b73472f2548719fdc6ead7ee8f3290
-
SHA1
e7952d2bbdb317885268bfd3995829aebeb640ee
-
SHA256
200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97
-
SHA512
48e06c178fc4c6ca3f1494cf1a329b0b98f81685ee764e5ce9784ecb8485047b6da812953ada43aa22484d709dd435678bc16bcddfea5c0f21d34d7f01ba5866
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecb:V8e8e8f8e8e8c
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000015f38-41.dat warzonerat behavioral1/files/0x0008000000015dac-78.dat warzonerat behavioral1/files/0x0008000000015fa6-93.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0009000000015f38-41.dat aspack_v212_v242 behavioral1/files/0x0008000000015dac-78.dat aspack_v212_v242 behavioral1/files/0x0008000000015fa6-93.dat aspack_v212_v242 -
Executes dropped EXE 10 IoCs
pid Process 1440 explorer.exe 2880 explorer.exe 2360 spoolsv.exe 2240 spoolsv.exe 1540 spoolsv.exe 2056 spoolsv.exe 2440 spoolsv.exe 1728 spoolsv.exe 1512 spoolsv.exe 2664 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2716 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 2716 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 2880 explorer.exe 2880 explorer.exe 2880 explorer.exe 2880 explorer.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 2880 explorer.exe 2880 explorer.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 1772 WerFault.exe 2880 explorer.exe 2880 explorer.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 2880 explorer.exe 2880 explorer.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2060 WerFault.exe 2880 explorer.exe 2880 explorer.exe 1904 WerFault.exe 1904 WerFault.exe 1904 WerFault.exe 1904 WerFault.exe 1904 WerFault.exe 1904 WerFault.exe 1904 WerFault.exe 2880 explorer.exe 2880 explorer.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2880 explorer.exe 2880 explorer.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2248 set thread context of 2716 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 30 PID 2248 set thread context of 2660 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 31 PID 1440 set thread context of 2880 1440 explorer.exe 34 PID 1440 set thread context of 1972 1440 explorer.exe 35 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 352 2240 WerFault.exe 1772 1540 WerFault.exe 39 1684 2056 WerFault.exe 2060 2440 WerFault.exe 1904 1728 WerFault.exe 45 2668 1512 WerFault.exe 47 2672 2664 WerFault.exe 49 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2716 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 2880 explorer.exe 2880 explorer.exe 2880 explorer.exe 2880 explorer.exe 2880 explorer.exe 2880 explorer.exe 2880 explorer.exe 2880 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 2716 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 2880 explorer.exe 2880 explorer.exe 2880 explorer.exe 2880 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2716 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 30 PID 2248 wrote to memory of 2716 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 30 PID 2248 wrote to memory of 2716 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 30 PID 2248 wrote to memory of 2716 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 30 PID 2248 wrote to memory of 2716 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 30 PID 2248 wrote to memory of 2716 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 30 PID 2248 wrote to memory of 2716 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 30 PID 2248 wrote to memory of 2716 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 30 PID 2248 wrote to memory of 2716 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 30 PID 2248 wrote to memory of 2660 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 31 PID 2248 wrote to memory of 2660 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 31 PID 2248 wrote to memory of 2660 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 31 PID 2248 wrote to memory of 2660 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 31 PID 2248 wrote to memory of 2660 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 31 PID 2248 wrote to memory of 2660 2248 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 31 PID 2716 wrote to memory of 1440 2716 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 32 PID 2716 wrote to memory of 1440 2716 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 32 PID 2716 wrote to memory of 1440 2716 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 32 PID 2716 wrote to memory of 1440 2716 200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe 32 PID 1440 wrote to memory of 2880 1440 explorer.exe 34 PID 1440 wrote to memory of 2880 1440 explorer.exe 34 PID 1440 wrote to memory of 2880 1440 explorer.exe 34 PID 1440 wrote to memory of 2880 1440 explorer.exe 34 PID 1440 wrote to memory of 2880 1440 explorer.exe 34 PID 1440 wrote to memory of 2880 1440 explorer.exe 34 PID 1440 wrote to memory of 2880 1440 explorer.exe 34 PID 1440 wrote to memory of 2880 1440 explorer.exe 34 PID 1440 wrote to memory of 2880 1440 explorer.exe 34 PID 1440 wrote to memory of 1972 1440 explorer.exe 35 PID 1440 wrote to memory of 1972 1440 explorer.exe 35 PID 1440 wrote to memory of 1972 1440 explorer.exe 35 PID 1440 wrote to memory of 1972 1440 explorer.exe 35 PID 1440 wrote to memory of 1972 1440 explorer.exe 35 PID 1440 wrote to memory of 1972 1440 explorer.exe 35 PID 2880 wrote to memory of 2360 2880 explorer.exe 36 PID 2880 wrote to memory of 2360 2880 explorer.exe 36 PID 2880 wrote to memory of 2360 2880 explorer.exe 36 PID 2880 wrote to memory of 2360 2880 explorer.exe 36 PID 2880 wrote to memory of 2240 2880 explorer.exe 37 PID 2880 wrote to memory of 2240 2880 explorer.exe 37 PID 2880 wrote to memory of 2240 2880 explorer.exe 37 PID 2880 wrote to memory of 2240 2880 explorer.exe 37 PID 2240 wrote to memory of 352 2240 spoolsv.exe 38 PID 2240 wrote to memory of 352 2240 spoolsv.exe 38 PID 2240 wrote to memory of 352 2240 spoolsv.exe 38 PID 2240 wrote to memory of 352 2240 spoolsv.exe 38 PID 2880 wrote to memory of 1540 2880 explorer.exe 39 PID 2880 wrote to memory of 1540 2880 explorer.exe 39 PID 2880 wrote to memory of 1540 2880 explorer.exe 39 PID 2880 wrote to memory of 1540 2880 explorer.exe 39 PID 1540 wrote to memory of 1772 1540 spoolsv.exe 40 PID 1540 wrote to memory of 1772 1540 spoolsv.exe 40 PID 1540 wrote to memory of 1772 1540 spoolsv.exe 40 PID 1540 wrote to memory of 1772 1540 spoolsv.exe 40 PID 2880 wrote to memory of 2056 2880 explorer.exe 41 PID 2880 wrote to memory of 2056 2880 explorer.exe 41 PID 2880 wrote to memory of 2056 2880 explorer.exe 41 PID 2880 wrote to memory of 2056 2880 explorer.exe 41 PID 2056 wrote to memory of 1684 2056 spoolsv.exe 42 PID 2056 wrote to memory of 1684 2056 spoolsv.exe 42 PID 2056 wrote to memory of 1684 2056 spoolsv.exe 42 PID 2056 wrote to memory of 1684 2056 spoolsv.exe 42 PID 2880 wrote to memory of 2440 2880 explorer.exe 43 PID 2880 wrote to memory of 2440 2880 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe"C:\Users\Admin\AppData\Local\Temp\200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe"C:\Users\Admin\AppData\Local\Temp\200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 366⤵
- Loads dropped DLL
- Program crash
PID:352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1772
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2060
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1904
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2668
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2672
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1972
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD5c0b73472f2548719fdc6ead7ee8f3290
SHA1e7952d2bbdb317885268bfd3995829aebeb640ee
SHA256200fbe9804ac9ecfde419797c29ad2ac4066053c5e951a7ea337c03051742e97
SHA51248e06c178fc4c6ca3f1494cf1a329b0b98f81685ee764e5ce9784ecb8485047b6da812953ada43aa22484d709dd435678bc16bcddfea5c0f21d34d7f01ba5866
-
Filesize
8.2MB
MD52a80f4d84315b42195b3b9e62511e721
SHA14ae2abd240afed66f4dee31f618906f757312548
SHA2560eb7e8695cb6259d80dcaeb40d87e622e0c63029da4c2d5410cf8d7880cb9c37
SHA51293e3414a11e97fb61d34f1d8b6911b759400af8a245c4cb4b1c93df8f9561b22f8fb239e6910a52c1a8c3e2902b0c44be7496cb68c71dfc0a1dd79bf8493cbcf
-
Filesize
8.2MB
MD502b16c7d0d208cf965ef4fdd7d922aee
SHA16e71b581bec2094f4a53eecc6a87494304444237
SHA256381f123e42eba3e1d1e33979f7abeccd2f079033c0a499dcd37d9a88d6c98701
SHA512fc7a0e82b52ebf0ec2c2302fe4ca36e35a13a2ec62a028470d5e6e5047f9a0c7b97590a3fde380c7e3028782deaf458185f78c3a38c4fc5156676711d3abb30c