Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 16:35
Behavioral task
behavioral1
Sample
03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe
Resource
win10v2004-20241007-en
General
-
Target
03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe
-
Size
8.2MB
-
MD5
b68998e3871efbc5498d951c844d51c0
-
SHA1
504230e66ef83d043d3871b77afb0c56baa62c04
-
SHA256
03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32
-
SHA512
0601181fafba10ac16ef0d93c6178159d6639c338c2474845fffbe156403f7cb7609e57e9e6d36ee317b36884306fd1c1e5f3d4b6cf5e0965f4ac43a01ff7884
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNec8:V8e8e8f8e8e8X
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000019d8e-42.dat warzonerat behavioral1/files/0x0007000000019c57-77.dat warzonerat behavioral1/files/0x0007000000019dbf-97.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0007000000019d8e-42.dat aspack_v212_v242 behavioral1/files/0x0007000000019c57-77.dat aspack_v212_v242 behavioral1/files/0x0007000000019dbf-97.dat aspack_v212_v242 -
Executes dropped EXE 9 IoCs
pid Process 1452 explorer.exe 2960 explorer.exe 888 spoolsv.exe 2124 spoolsv.exe 2148 spoolsv.exe 876 spoolsv.exe 2208 spoolsv.exe 1216 spoolsv.exe 2596 spoolsv.exe -
Loads dropped DLL 58 IoCs
pid Process 2968 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 2968 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2220 WerFault.exe 2220 WerFault.exe 2220 WerFault.exe 2220 WerFault.exe 2220 WerFault.exe 2220 WerFault.exe 2220 WerFault.exe 2960 explorer.exe 2960 explorer.exe 952 WerFault.exe 952 WerFault.exe 952 WerFault.exe 952 WerFault.exe 952 WerFault.exe 952 WerFault.exe 952 WerFault.exe 2960 explorer.exe 2960 explorer.exe 1816 WerFault.exe 1816 WerFault.exe 1816 WerFault.exe 1816 WerFault.exe 1816 WerFault.exe 1816 WerFault.exe 1816 WerFault.exe 2960 explorer.exe 2960 explorer.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 2960 explorer.exe 2960 explorer.exe 2152 WerFault.exe 2152 WerFault.exe 2152 WerFault.exe 2152 WerFault.exe 2152 WerFault.exe 2152 WerFault.exe 2152 WerFault.exe 2960 explorer.exe 2960 explorer.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2308 set thread context of 2968 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 30 PID 2308 set thread context of 2804 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 31 PID 1452 set thread context of 2960 1452 explorer.exe 33 PID 1452 set thread context of 1724 1452 explorer.exe 34 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2220 2124 WerFault.exe 36 952 2148 WerFault.exe 38 1816 876 WerFault.exe 40 1652 2208 WerFault.exe 42 2152 1216 WerFault.exe 44 1600 2596 WerFault.exe 46 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2968 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 2968 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2968 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 30 PID 2308 wrote to memory of 2968 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 30 PID 2308 wrote to memory of 2968 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 30 PID 2308 wrote to memory of 2968 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 30 PID 2308 wrote to memory of 2968 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 30 PID 2308 wrote to memory of 2968 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 30 PID 2308 wrote to memory of 2968 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 30 PID 2308 wrote to memory of 2968 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 30 PID 2308 wrote to memory of 2968 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 30 PID 2308 wrote to memory of 2804 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 31 PID 2308 wrote to memory of 2804 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 31 PID 2308 wrote to memory of 2804 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 31 PID 2308 wrote to memory of 2804 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 31 PID 2308 wrote to memory of 2804 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 31 PID 2308 wrote to memory of 2804 2308 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 31 PID 2968 wrote to memory of 1452 2968 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 32 PID 2968 wrote to memory of 1452 2968 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 32 PID 2968 wrote to memory of 1452 2968 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 32 PID 2968 wrote to memory of 1452 2968 03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe 32 PID 1452 wrote to memory of 2960 1452 explorer.exe 33 PID 1452 wrote to memory of 2960 1452 explorer.exe 33 PID 1452 wrote to memory of 2960 1452 explorer.exe 33 PID 1452 wrote to memory of 2960 1452 explorer.exe 33 PID 1452 wrote to memory of 2960 1452 explorer.exe 33 PID 1452 wrote to memory of 2960 1452 explorer.exe 33 PID 1452 wrote to memory of 2960 1452 explorer.exe 33 PID 1452 wrote to memory of 2960 1452 explorer.exe 33 PID 1452 wrote to memory of 2960 1452 explorer.exe 33 PID 1452 wrote to memory of 1724 1452 explorer.exe 34 PID 1452 wrote to memory of 1724 1452 explorer.exe 34 PID 1452 wrote to memory of 1724 1452 explorer.exe 34 PID 1452 wrote to memory of 1724 1452 explorer.exe 34 PID 1452 wrote to memory of 1724 1452 explorer.exe 34 PID 1452 wrote to memory of 1724 1452 explorer.exe 34 PID 2960 wrote to memory of 888 2960 explorer.exe 35 PID 2960 wrote to memory of 888 2960 explorer.exe 35 PID 2960 wrote to memory of 888 2960 explorer.exe 35 PID 2960 wrote to memory of 888 2960 explorer.exe 35 PID 2960 wrote to memory of 2124 2960 explorer.exe 36 PID 2960 wrote to memory of 2124 2960 explorer.exe 36 PID 2960 wrote to memory of 2124 2960 explorer.exe 36 PID 2960 wrote to memory of 2124 2960 explorer.exe 36 PID 2124 wrote to memory of 2220 2124 spoolsv.exe 37 PID 2124 wrote to memory of 2220 2124 spoolsv.exe 37 PID 2124 wrote to memory of 2220 2124 spoolsv.exe 37 PID 2124 wrote to memory of 2220 2124 spoolsv.exe 37 PID 2960 wrote to memory of 2148 2960 explorer.exe 38 PID 2960 wrote to memory of 2148 2960 explorer.exe 38 PID 2960 wrote to memory of 2148 2960 explorer.exe 38 PID 2960 wrote to memory of 2148 2960 explorer.exe 38 PID 2148 wrote to memory of 952 2148 spoolsv.exe 39 PID 2148 wrote to memory of 952 2148 spoolsv.exe 39 PID 2148 wrote to memory of 952 2148 spoolsv.exe 39 PID 2148 wrote to memory of 952 2148 spoolsv.exe 39 PID 2960 wrote to memory of 876 2960 explorer.exe 40 PID 2960 wrote to memory of 876 2960 explorer.exe 40 PID 2960 wrote to memory of 876 2960 explorer.exe 40 PID 2960 wrote to memory of 876 2960 explorer.exe 40 PID 876 wrote to memory of 1816 876 spoolsv.exe 41 PID 876 wrote to memory of 1816 876 spoolsv.exe 41 PID 876 wrote to memory of 1816 876 spoolsv.exe 41 PID 876 wrote to memory of 1816 876 spoolsv.exe 41 PID 2960 wrote to memory of 2208 2960 explorer.exe 42 PID 2960 wrote to memory of 2208 2960 explorer.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe"C:\Users\Admin\AppData\Local\Temp\03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe"C:\Users\Admin\AppData\Local\Temp\03d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:888
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2220
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 366⤵
- Loads dropped DLL
- Program crash
PID:952
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 876 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1816
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1652
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2152
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1600
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1724
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD5b68998e3871efbc5498d951c844d51c0
SHA1504230e66ef83d043d3871b77afb0c56baa62c04
SHA25603d5d448679bca47135c8426a5a9b7b9251de19542301da485fa559754d38f32
SHA5120601181fafba10ac16ef0d93c6178159d6639c338c2474845fffbe156403f7cb7609e57e9e6d36ee317b36884306fd1c1e5f3d4b6cf5e0965f4ac43a01ff7884
-
Filesize
8.2MB
MD53f013f1547febf4a60d6cc706912810f
SHA193e1bcef027427214c7b8fd1aa90f77084af980d
SHA256473089552bca8d4ec7ccc6a778d0ff7a4246656d8a2f210e50b38e3f42d12f18
SHA512b61b6191f394cc2acb7e0ca6ce05c8ffb714f648007f3be67718f55847ebd9df4f3c8ea58025dfb293c29e8f27f27f260cf3bb31883a9e62f6cf97b7e38ad86f
-
Filesize
8.2MB
MD523d4ba7e73ec0fce785d92707a97b6a2
SHA13b9f358eb734d8b49f04ddf4a4c8f7e2f74ee73b
SHA256b54676dda392ad24555db8f721191f9c04fa8384aafe5afbca46bb143fcabd8c
SHA5121494943392c931b45b1f803f77ef8a803c9f7b6de60d1221dde46c132681820f90cffe93d9b4360c00ea463838d34e19cb7a446c9c07217118b864955a936989