Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 23:08

General

  • Target

    1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe

  • Size

    8.2MB

  • MD5

    4e62a4274a0ec4cb04a71161ce7ce2f0

  • SHA1

    d9565c52ae41f7288ae995cf236cf7c83c0c61ff

  • SHA256

    1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98

  • SHA512

    ac46c2aa574c2fca975bf076afe8d77e1d580b075711d79052bf58e30a9cbb2c2b79ad0c3b5e339dd4dfddb904c70f4f7e6aaf0599f347d726e54ff1f76dce53

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecT:V8e8e8f8e8e8I

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe
    "C:\Users\Admin\AppData\Local\Temp\1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe
      "C:\Users\Admin\AppData\Local\Temp\1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98N.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2016
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1740
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2892
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2100
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2340
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2988
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1012
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:444
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1316
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1732
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1664
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2320
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1284
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2328
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1960
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1528
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:2436
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:596

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        4e62a4274a0ec4cb04a71161ce7ce2f0

        SHA1

        d9565c52ae41f7288ae995cf236cf7c83c0c61ff

        SHA256

        1c820fcba0278fc3b44eddd77706776243e7fd0ad4e49d5291dda6aac57f8c98

        SHA512

        ac46c2aa574c2fca975bf076afe8d77e1d580b075711d79052bf58e30a9cbb2c2b79ad0c3b5e339dd4dfddb904c70f4f7e6aaf0599f347d726e54ff1f76dce53

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        6cc832109229dbffd7740b940ad3205e

        SHA1

        1f5006d99456141e0c8ec4a4c571051f6c191c07

        SHA256

        0665dc5ec7badfb2ba586fd4cae44e482844722d702f61c20e5a01bcf7e5fb25

        SHA512

        ea63b99966591d77e7e07c1a350d5d36e6cd1e76fa4a373c01ffb1b2528e0d0d9ca66ea6a99f1887399eb0931f86be20f944c5dc42808d1071225bf7a1fa154a

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        959f0e4d6bd43c59832ff32ec1d9c562

        SHA1

        0cfe94822268c3b7827b1c201ec86abf54cfbcd1

        SHA256

        24d86af29a12334fcc177dde3a739c325381fc85efa45ca905d16431f7264883

        SHA512

        1dfa2cd4dd4e8a368bd162b930f397f65392a6d8bbb504cd62133b3dcc5fe0fcd5e6f8c186fcc67af67cae556033a0926afd83d14121138e678575b769f7215f

      • memory/596-27-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/596-37-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/596-39-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/596-31-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/596-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/1740-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1740-55-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1740-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1740-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1740-58-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1740-87-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2016-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2016-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2016-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2016-57-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2016-18-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2016-45-0x00000000032A0000-0x00000000033B4000-memory.dmp

        Filesize

        1.1MB

      • memory/2016-51-0x00000000032A0000-0x00000000033B4000-memory.dmp

        Filesize

        1.1MB

      • memory/2016-26-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2100-103-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2100-141-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2100-104-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2100-102-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2340-116-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2436-83-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2732-22-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2732-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2732-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2732-6-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/2732-3-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/2732-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2732-38-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2732-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-115-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-124-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2892-130-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-133-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-100-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-144-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-143-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB