Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 00:04
Behavioral task
behavioral1
Sample
cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe
Resource
win10v2004-20241007-en
General
-
Target
cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe
-
Size
8.2MB
-
MD5
ce8226da4d1e5d866924eab342e45120
-
SHA1
86971e55d9293a618e31b4552fa46cd537346a43
-
SHA256
cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6c
-
SHA512
fae7a0ffe54d7231d4316d67d3243333e0fa227a8d79697022bb774839444445d36e636369a7cb08b2423f7310909bcd9bf23410dd0749247838a93612aa2bce
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNeco:V8e8e8f8e8e8X
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x00070000000186f8-41.dat warzonerat behavioral1/memory/2780-51-0x0000000003130000-0x0000000003244000-memory.dmp warzonerat behavioral1/files/0x0009000000018669-80.dat warzonerat behavioral1/files/0x0007000000018731-94.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x00070000000186f8-41.dat aspack_v212_v242 behavioral1/files/0x0009000000018669-80.dat aspack_v212_v242 behavioral1/files/0x0007000000018731-94.dat aspack_v212_v242 -
Executes dropped EXE 10 IoCs
pid Process 2980 explorer.exe 1044 explorer.exe 1672 spoolsv.exe 880 spoolsv.exe 992 spoolsv.exe 848 spoolsv.exe 580 spoolsv.exe 892 spoolsv.exe 2652 spoolsv.exe 2992 spoolsv.exe -
Loads dropped DLL 64 IoCs
pid Process 2780 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 2780 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 916 WerFault.exe 916 WerFault.exe 916 WerFault.exe 916 WerFault.exe 916 WerFault.exe 916 WerFault.exe 916 WerFault.exe 1044 explorer.exe 1044 explorer.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1632 WerFault.exe 1044 explorer.exe 1044 explorer.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 2076 WerFault.exe 1044 explorer.exe 1044 explorer.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe 1044 explorer.exe 1044 explorer.exe 1484 WerFault.exe 1484 WerFault.exe 1484 WerFault.exe 1484 WerFault.exe 1484 WerFault.exe 1484 WerFault.exe 1484 WerFault.exe 1044 explorer.exe 1044 explorer.exe 2324 WerFault.exe 2324 WerFault.exe 2324 WerFault.exe 2324 WerFault.exe 2324 WerFault.exe 2324 WerFault.exe 2324 WerFault.exe 1044 explorer.exe 1044 explorer.exe 2416 WerFault.exe 2416 WerFault.exe 2416 WerFault.exe 2416 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2364 set thread context of 2780 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 31 PID 2364 set thread context of 2580 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 32 PID 2980 set thread context of 1044 2980 explorer.exe 35 PID 2980 set thread context of 1132 2980 explorer.exe 36 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 916 880 WerFault.exe 1632 992 WerFault.exe 2076 848 WerFault.exe 2240 580 WerFault.exe 44 1484 892 WerFault.exe 46 2324 2652 WerFault.exe 48 2416 2992 WerFault.exe 50 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2780 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2780 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 2780 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2780 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 31 PID 2364 wrote to memory of 2780 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 31 PID 2364 wrote to memory of 2780 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 31 PID 2364 wrote to memory of 2780 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 31 PID 2364 wrote to memory of 2780 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 31 PID 2364 wrote to memory of 2780 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 31 PID 2364 wrote to memory of 2780 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 31 PID 2364 wrote to memory of 2780 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 31 PID 2364 wrote to memory of 2780 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 31 PID 2364 wrote to memory of 2580 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 32 PID 2364 wrote to memory of 2580 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 32 PID 2364 wrote to memory of 2580 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 32 PID 2364 wrote to memory of 2580 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 32 PID 2364 wrote to memory of 2580 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 32 PID 2364 wrote to memory of 2580 2364 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 32 PID 2780 wrote to memory of 2980 2780 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 33 PID 2780 wrote to memory of 2980 2780 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 33 PID 2780 wrote to memory of 2980 2780 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 33 PID 2780 wrote to memory of 2980 2780 cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe 33 PID 2980 wrote to memory of 1044 2980 explorer.exe 35 PID 2980 wrote to memory of 1044 2980 explorer.exe 35 PID 2980 wrote to memory of 1044 2980 explorer.exe 35 PID 2980 wrote to memory of 1044 2980 explorer.exe 35 PID 2980 wrote to memory of 1044 2980 explorer.exe 35 PID 2980 wrote to memory of 1044 2980 explorer.exe 35 PID 2980 wrote to memory of 1044 2980 explorer.exe 35 PID 2980 wrote to memory of 1044 2980 explorer.exe 35 PID 2980 wrote to memory of 1044 2980 explorer.exe 35 PID 2980 wrote to memory of 1132 2980 explorer.exe 36 PID 2980 wrote to memory of 1132 2980 explorer.exe 36 PID 2980 wrote to memory of 1132 2980 explorer.exe 36 PID 2980 wrote to memory of 1132 2980 explorer.exe 36 PID 2980 wrote to memory of 1132 2980 explorer.exe 36 PID 2980 wrote to memory of 1132 2980 explorer.exe 36 PID 1044 wrote to memory of 1672 1044 explorer.exe 37 PID 1044 wrote to memory of 1672 1044 explorer.exe 37 PID 1044 wrote to memory of 1672 1044 explorer.exe 37 PID 1044 wrote to memory of 1672 1044 explorer.exe 37 PID 1044 wrote to memory of 880 1044 explorer.exe 38 PID 1044 wrote to memory of 880 1044 explorer.exe 38 PID 1044 wrote to memory of 880 1044 explorer.exe 38 PID 1044 wrote to memory of 880 1044 explorer.exe 38 PID 880 wrote to memory of 916 880 spoolsv.exe 39 PID 880 wrote to memory of 916 880 spoolsv.exe 39 PID 880 wrote to memory of 916 880 spoolsv.exe 39 PID 880 wrote to memory of 916 880 spoolsv.exe 39 PID 1044 wrote to memory of 992 1044 explorer.exe 40 PID 1044 wrote to memory of 992 1044 explorer.exe 40 PID 1044 wrote to memory of 992 1044 explorer.exe 40 PID 1044 wrote to memory of 992 1044 explorer.exe 40 PID 992 wrote to memory of 1632 992 spoolsv.exe 41 PID 992 wrote to memory of 1632 992 spoolsv.exe 41 PID 992 wrote to memory of 1632 992 spoolsv.exe 41 PID 992 wrote to memory of 1632 992 spoolsv.exe 41 PID 1044 wrote to memory of 848 1044 explorer.exe 42 PID 1044 wrote to memory of 848 1044 explorer.exe 42 PID 1044 wrote to memory of 848 1044 explorer.exe 42 PID 1044 wrote to memory of 848 1044 explorer.exe 42 PID 848 wrote to memory of 2076 848 spoolsv.exe 43 PID 848 wrote to memory of 2076 848 spoolsv.exe 43 PID 848 wrote to memory of 2076 848 spoolsv.exe 43 PID 848 wrote to memory of 2076 848 spoolsv.exe 43 PID 1044 wrote to memory of 580 1044 explorer.exe 44 PID 1044 wrote to memory of 580 1044 explorer.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe"C:\Users\Admin\AppData\Local\Temp\cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe"C:\Users\Admin\AppData\Local\Temp\cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6cN.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1672
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 366⤵
- Loads dropped DLL
- Program crash
PID:916
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1632
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2076
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2240
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1484
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2324
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2416
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1132
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD5ce8226da4d1e5d866924eab342e45120
SHA186971e55d9293a618e31b4552fa46cd537346a43
SHA256cc8b97603d4ccd166d13d38d70ed607c127b53318e849e17f58032de04269c6c
SHA512fae7a0ffe54d7231d4316d67d3243333e0fa227a8d79697022bb774839444445d36e636369a7cb08b2423f7310909bcd9bf23410dd0749247838a93612aa2bce
-
Filesize
8.2MB
MD57323a33b6e9dac206a6a657d77df5e09
SHA1f1fd1dbb84e8aba77fa570c6225270a177f07c64
SHA256a66917cbad7384ff2bcc8f881fef8bb97f78fe51423bbfc3a14ea97a8ba98fb8
SHA5121f00bed54dbb3f0e90bdb568477c8a03e83c45989814a83b577d8695fc50f504f11c253f5beb1aa4d053c41dc4aa57b8075ce41ae269f3e9bc064206897ca33d
-
Filesize
8.2MB
MD5a18b410952347c5ba9e432389debbc0f
SHA10ca77220ee39e4f540dfc9c6b1ccd99bd8c0830f
SHA256e12127e80aaf1bfe75d9eec88a0864f11a8ae15f03829f7816149fdad2fd1f73
SHA512250a3664d391ce5c3480369ddd0ba718cd02b32989077ed201929143cb64487dc27f710dbb77cafa30c4400a2018ea13faf967f88b2ba8f9b4b852fd3c6e1507