Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 04:36

General

  • Target

    0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe

  • Size

    8.2MB

  • MD5

    cadf9a61b1390a36a29c01e118be8a20

  • SHA1

    78ef4702848ffdd3819a2d323090d6a71f95f8a8

  • SHA256

    0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbc

  • SHA512

    37bfce0b2626632018120116ec72685602d280826e4b6bc6ea187c8eda8d7f80f18f04f4ae0b7f72e04c44f122db0f51f2a090fcac750dce3d8709b00695d7de

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNec5:V8e8e8f8e8e8u

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe
    "C:\Users\Admin\AppData\Local\Temp\0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Users\Admin\AppData\Local\Temp\0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe
      "C:\Users\Admin\AppData\Local\Temp\0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbcN.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2748
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2464
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1276
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2228
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2268
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1748
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1340
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2192
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3016
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1492
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1724
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2184
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1756
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:3000
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2148
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2348
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:1764
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2888

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        cadf9a61b1390a36a29c01e118be8a20

        SHA1

        78ef4702848ffdd3819a2d323090d6a71f95f8a8

        SHA256

        0e04e00d34c90ca87be59fbd0048733df6e2882f50d570832f2e0e6f6c856bbc

        SHA512

        37bfce0b2626632018120116ec72685602d280826e4b6bc6ea187c8eda8d7f80f18f04f4ae0b7f72e04c44f122db0f51f2a090fcac750dce3d8709b00695d7de

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        4be666a26da92e9a34714c24a1c33b2e

        SHA1

        a82365614d214f5c68773742169591f5203b8fed

        SHA256

        4bb2b1d986615eb9e66cdddee9a61d1baff32936ec54b463a3077c3405f770ac

        SHA512

        fc94e176dc8c80c1e32d6fa466df4abe28b335a081ef977465b01fe93f85d3da71abc63917502fc67b8c58ea161785a9642cccdf5b47e98e12e6b66d463a1f2c

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        ddf241dca5fa37d28a544ec8b3254bed

        SHA1

        bdfd3fc2a6dae16011ba0673b475143a76e742d0

        SHA256

        7f0f4f7a13928f562cfda20ce33b787e38d15020f58c34590e7477aa55b0e3ff

        SHA512

        d98da7ee70c255b6c247e67fa8534d99f6aef7fd2159a617e3f321cb2ee9aeac9a4e7ab585a8a861184ca7dc81e097f19dccc8dcb3bba46c52a603e6ccff7012

      • memory/1276-136-0x0000000003360000-0x0000000003474000-memory.dmp

        Filesize

        1.1MB

      • memory/1276-92-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1276-97-0x0000000003360000-0x0000000003474000-memory.dmp

        Filesize

        1.1MB

      • memory/1276-115-0x0000000003360000-0x0000000003474000-memory.dmp

        Filesize

        1.1MB

      • memory/1276-145-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1276-134-0x0000000003360000-0x0000000003474000-memory.dmp

        Filesize

        1.1MB

      • memory/1276-124-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1724-171-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1756-189-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2072-25-0x0000000003290000-0x00000000033A4000-memory.dmp

        Filesize

        1.1MB

      • memory/2072-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2072-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2072-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2072-36-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2072-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2072-3-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2072-6-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2228-104-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2228-103-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2228-105-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2228-135-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2268-126-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2268-117-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2464-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2464-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2464-91-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2464-59-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2464-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2464-55-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2748-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2748-26-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2748-49-0x0000000003230000-0x0000000003344000-memory.dmp

        Filesize

        1.1MB

      • memory/2748-50-0x0000000003230000-0x0000000003344000-memory.dmp

        Filesize

        1.1MB

      • memory/2748-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2748-56-0x0000000000440000-0x000000000051F000-memory.dmp

        Filesize

        892KB

      • memory/2748-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2748-58-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2748-18-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2888-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2888-31-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2888-35-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2888-37-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2888-27-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/3016-155-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB