Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 23:08
Behavioral task
behavioral1
Sample
1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe
Resource
win10v2004-20241007-en
General
-
Target
1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe
-
Size
8.2MB
-
MD5
4e62a4274a0ec4cb04a71161ce7ce2f0
-
SHA1
d9565c52ae41f7288ae995cf236cf7c83c0c61ff
-
SHA256
1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98
-
SHA512
ac46c2aa574c2fca975bf076afe8d77e1d580b075711d79052bf58e30a9cbb2c2b79ad0c3b5e339dd4dfddb904c70f4f7e6aaf0599f347d726e54ff1f76dce53
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecT:V8e8e8f8e8e8I
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x0009000000016d21-42.dat warzonerat behavioral1/memory/2016-45-0x00000000032A0000-0x00000000033B4000-memory.dmp warzonerat behavioral1/files/0x0008000000016d0e-79.dat warzonerat behavioral1/files/0x000a000000016d0e-94.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0009000000016d21-42.dat aspack_v212_v242 behavioral1/files/0x0008000000016d0e-79.dat aspack_v212_v242 behavioral1/files/0x000a000000016d0e-94.dat aspack_v212_v242 -
Executes dropped EXE 9 IoCs
pid Process 1740 explorer.exe 2892 explorer.exe 2100 spoolsv.exe 2340 spoolsv.exe 1012 spoolsv.exe 1316 spoolsv.exe 1664 spoolsv.exe 1284 spoolsv.exe 1960 spoolsv.exe -
Loads dropped DLL 58 IoCs
pid Process 2016 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 2016 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2988 WerFault.exe 2988 WerFault.exe 2988 WerFault.exe 2988 WerFault.exe 2988 WerFault.exe 2988 WerFault.exe 2988 WerFault.exe 2892 explorer.exe 2892 explorer.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 2892 explorer.exe 2892 explorer.exe 1732 WerFault.exe 1732 WerFault.exe 1732 WerFault.exe 1732 WerFault.exe 1732 WerFault.exe 1732 WerFault.exe 1732 WerFault.exe 2892 explorer.exe 2892 explorer.exe 2320 WerFault.exe 2320 WerFault.exe 2320 WerFault.exe 2320 WerFault.exe 2320 WerFault.exe 2320 WerFault.exe 2320 WerFault.exe 2892 explorer.exe 2892 explorer.exe 2328 WerFault.exe 2328 WerFault.exe 2328 WerFault.exe 2328 WerFault.exe 2328 WerFault.exe 2328 WerFault.exe 2328 WerFault.exe 2892 explorer.exe 2892 explorer.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe 1528 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2732 set thread context of 2016 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 31 PID 2732 set thread context of 596 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 32 PID 1740 set thread context of 2892 1740 explorer.exe 34 PID 1740 set thread context of 2436 1740 explorer.exe 35 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2988 2340 WerFault.exe 37 444 1012 WerFault.exe 39 1732 1316 WerFault.exe 41 2320 1664 WerFault.exe 43 2328 1284 WerFault.exe 45 1528 1960 WerFault.exe 47 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2016 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 2016 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2016 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 31 PID 2732 wrote to memory of 2016 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 31 PID 2732 wrote to memory of 2016 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 31 PID 2732 wrote to memory of 2016 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 31 PID 2732 wrote to memory of 2016 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 31 PID 2732 wrote to memory of 2016 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 31 PID 2732 wrote to memory of 2016 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 31 PID 2732 wrote to memory of 2016 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 31 PID 2732 wrote to memory of 2016 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 31 PID 2732 wrote to memory of 596 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 32 PID 2732 wrote to memory of 596 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 32 PID 2732 wrote to memory of 596 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 32 PID 2732 wrote to memory of 596 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 32 PID 2732 wrote to memory of 596 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 32 PID 2732 wrote to memory of 596 2732 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 32 PID 2016 wrote to memory of 1740 2016 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 33 PID 2016 wrote to memory of 1740 2016 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 33 PID 2016 wrote to memory of 1740 2016 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 33 PID 2016 wrote to memory of 1740 2016 1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe 33 PID 1740 wrote to memory of 2892 1740 explorer.exe 34 PID 1740 wrote to memory of 2892 1740 explorer.exe 34 PID 1740 wrote to memory of 2892 1740 explorer.exe 34 PID 1740 wrote to memory of 2892 1740 explorer.exe 34 PID 1740 wrote to memory of 2892 1740 explorer.exe 34 PID 1740 wrote to memory of 2892 1740 explorer.exe 34 PID 1740 wrote to memory of 2892 1740 explorer.exe 34 PID 1740 wrote to memory of 2892 1740 explorer.exe 34 PID 1740 wrote to memory of 2892 1740 explorer.exe 34 PID 1740 wrote to memory of 2436 1740 explorer.exe 35 PID 1740 wrote to memory of 2436 1740 explorer.exe 35 PID 1740 wrote to memory of 2436 1740 explorer.exe 35 PID 1740 wrote to memory of 2436 1740 explorer.exe 35 PID 1740 wrote to memory of 2436 1740 explorer.exe 35 PID 1740 wrote to memory of 2436 1740 explorer.exe 35 PID 2892 wrote to memory of 2100 2892 explorer.exe 36 PID 2892 wrote to memory of 2100 2892 explorer.exe 36 PID 2892 wrote to memory of 2100 2892 explorer.exe 36 PID 2892 wrote to memory of 2100 2892 explorer.exe 36 PID 2892 wrote to memory of 2340 2892 explorer.exe 37 PID 2892 wrote to memory of 2340 2892 explorer.exe 37 PID 2892 wrote to memory of 2340 2892 explorer.exe 37 PID 2892 wrote to memory of 2340 2892 explorer.exe 37 PID 2340 wrote to memory of 2988 2340 spoolsv.exe 38 PID 2340 wrote to memory of 2988 2340 spoolsv.exe 38 PID 2340 wrote to memory of 2988 2340 spoolsv.exe 38 PID 2340 wrote to memory of 2988 2340 spoolsv.exe 38 PID 2892 wrote to memory of 1012 2892 explorer.exe 39 PID 2892 wrote to memory of 1012 2892 explorer.exe 39 PID 2892 wrote to memory of 1012 2892 explorer.exe 39 PID 2892 wrote to memory of 1012 2892 explorer.exe 39 PID 1012 wrote to memory of 444 1012 spoolsv.exe 40 PID 1012 wrote to memory of 444 1012 spoolsv.exe 40 PID 1012 wrote to memory of 444 1012 spoolsv.exe 40 PID 1012 wrote to memory of 444 1012 spoolsv.exe 40 PID 2892 wrote to memory of 1316 2892 explorer.exe 41 PID 2892 wrote to memory of 1316 2892 explorer.exe 41 PID 2892 wrote to memory of 1316 2892 explorer.exe 41 PID 2892 wrote to memory of 1316 2892 explorer.exe 41 PID 1316 wrote to memory of 1732 1316 spoolsv.exe 42 PID 1316 wrote to memory of 1732 1316 spoolsv.exe 42 PID 1316 wrote to memory of 1732 1316 spoolsv.exe 42 PID 1316 wrote to memory of 1732 1316 spoolsv.exe 42 PID 2892 wrote to memory of 1664 2892 explorer.exe 43 PID 2892 wrote to memory of 1664 2892 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe"C:\Users\Admin\AppData\Local\Temp\1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe"C:\Users\Admin\AppData\Local\Temp\1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2100
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2988
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 366⤵
- Loads dropped DLL
- Program crash
PID:444
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2328
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1528
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:2436
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:596
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD54e62a4274a0ec4cb04a71161ce7ce2f0
SHA1d9565c52ae41f7288ae995cf236cf7c83c0c61ff
SHA2561c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98
SHA512ac46c2aa574c2fca975bf076afe8d77e1d580b075711d79052bf58e30a9cbb2c2b79ad0c3b5e339dd4dfddb904c70f4f7e6aaf0599f347d726e54ff1f76dce53
-
Filesize
8.2MB
MD56cc832109229dbffd7740b940ad3205e
SHA11f5006d99456141e0c8ec4a4c571051f6c191c07
SHA2560665dc5ec7badfb2ba586fd4cae44e482844722d702f61c20e5a01bcf7e5fb25
SHA512ea63b99966591d77e7e07c1a350d5d36e6cd1e76fa4a373c01ffb1b2528e0d0d9ca66ea6a99f1887399eb0931f86be20f944c5dc42808d1071225bf7a1fa154a
-
Filesize
8.2MB
MD5959f0e4d6bd43c59832ff32ec1d9c562
SHA10cfe94822268c3b7827b1c201ec86abf54cfbcd1
SHA25624d86af29a12334fcc177dde3a739c325381fc85efa45ca905d16431f7264883
SHA5121dfa2cd4dd4e8a368bd162b930f397f65392a6d8bbb504cd62133b3dcc5fe0fcd5e6f8c186fcc67af67cae556033a0926afd83d14121138e678575b769f7215f