Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 20:31

General

  • Target

    9d253259bb2c439a5a34defbf6cfaaefee40da12ceb29175b0ad2659c868d53aN.exe

  • Size

    8.2MB

  • MD5

    07802690ff357e317f880d9243628120

  • SHA1

    ffdc476f2e65b14e2a903b0e0eeb75669ee83c00

  • SHA256

    9d253259bb2c439a5a34defbf6cfaaefee40da12ceb29175b0ad2659c868d53a

  • SHA512

    d22e1bbb50ee93a10a67e27e92ecd2af30f558bed30a228560897b92bd7e906308ec59dc9ad1df420012b85a9659ac9e3eafd82d3c2caee8ab02c2290509d041

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNec8:V8e8e8f8e8e8/

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 7 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 7 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d253259bb2c439a5a34defbf6cfaaefee40da12ceb29175b0ad2659c868d53aN.exe
    "C:\Users\Admin\AppData\Local\Temp\9d253259bb2c439a5a34defbf6cfaaefee40da12ceb29175b0ad2659c868d53aN.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Users\Admin\AppData\Local\Temp\9d253259bb2c439a5a34defbf6cfaaefee40da12ceb29175b0ad2659c868d53aN.exe
      "C:\Users\Admin\AppData\Local\Temp\9d253259bb2c439a5a34defbf6cfaaefee40da12ceb29175b0ad2659c868d53aN.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2740
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1852
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2424
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2224
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2264
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2268
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:592
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2440
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1828
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1760
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1268
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1208
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1284
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:880
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2868
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2252
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:2144
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:484

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        07802690ff357e317f880d9243628120

        SHA1

        ffdc476f2e65b14e2a903b0e0eeb75669ee83c00

        SHA256

        9d253259bb2c439a5a34defbf6cfaaefee40da12ceb29175b0ad2659c868d53a

        SHA512

        d22e1bbb50ee93a10a67e27e92ecd2af30f558bed30a228560897b92bd7e906308ec59dc9ad1df420012b85a9659ac9e3eafd82d3c2caee8ab02c2290509d041

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        b10973bd002b44fcf228876a1df8b22d

        SHA1

        9b1b459de6e670535492fc146568f64cdb2f29f9

        SHA256

        c3cc78e457bac34c8c4292b746803e0afc7244c223e7c4f58158cc8d4010fb86

        SHA512

        c70c66c598ad852a2817b164560fa2d8567d544466a9f9ed11f1b16232fd4f7ac6e62fc38e874449f5f8ad17ca314c277119d55ebb94f7411de6117bd9da3ca4

      • C:\Windows\system\spoolsv.exe

        Filesize

        4.7MB

        MD5

        490d8238c5ac051efa24f5e81c82a88e

        SHA1

        cd4517ab4892d204506fbcb886e1b559508322e6

        SHA256

        ffb566410236c4bdbcd67c1225fdf90e9e70ebd0704770562a6edab05b8b919c

        SHA512

        3becada8af54b820b7aff12a9c82506fdd2884e4b12efc605be8a82ac813d87be6ba98020f466d5ef493dfbc6f540f0359ffb22324993870b74cb0de16868215

      • \Windows\system\spoolsv.exe

        Filesize

        5.2MB

        MD5

        f0983b64cf2f6c548df0ea05f450cf11

        SHA1

        0186086402db530b4bab0495e6955ed115f0100a

        SHA256

        72fe089e6b60cc535745696bf4624034a27d59720dd91f7da3a94ec8ca26e37c

        SHA512

        8125d1379c98eb08a512fd6b03d0df59c408bae784e7c73bb57ca41398295d350220468469c6985b2dcfb31bba0e482d1b9fc6e71d84942864d160d6a34d53c4

      • \Windows\system\spoolsv.exe

        Filesize

        5.5MB

        MD5

        fbed2d534518d4633156506933e30c5a

        SHA1

        21cff5047fd8e5128303a01366f943fcbd0520fc

        SHA256

        a3b0363a05df2eae8a8fbedd307bf79e1f8bfb3669faa31a21c8680b0d6ccbac

        SHA512

        ff24d3b32f1dfc8584b49f0327b79d9053c3f251ecb5cdffacee9647916e9a0bf93a190fb7725f0961e9faa80f3372561928bda638d200ca00c2c47fd5c126fb

      • \Windows\system\spoolsv.exe

        Filesize

        4.4MB

        MD5

        83aba96cbf89a0c2175fba7dda88e223

        SHA1

        9cf0f157a4542c227fd808991e839908198e168a

        SHA256

        96cbc475a0a0e0e857f973dd6921d565a66ea44dbd092175a08fbba5c90f822c

        SHA512

        d11d4f852fa294e128c332c5e623d5bf43788a1b06e441d2a026b736a883e39e017d7b6238d7ae56d3e731ff57618a4deb2882168686ce19f288c690a89c94b4

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        82c887b6f01317dfd5b11baf812ea393

        SHA1

        d2c5bae0952ea1ebac7479acf1b62b0c07f6a2b8

        SHA256

        16c1d894b9afddca31d4d2afe6cffcd91eedbb7193fe649f08f37448b1fbc955

        SHA512

        da10395636db70a7734e5c3dafcf46693df3a9008bcc5e5dadd1568a47029b270dd13c31e01a63043d382c95b6dd5fd9ada376c2524c8b1975f56dc7fcb511fe

      • memory/484-33-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/484-29-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/484-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/484-40-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/484-39-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/592-137-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1268-173-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1284-193-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1828-157-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1852-90-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1852-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1852-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1852-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1852-57-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2144-82-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2224-100-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2224-135-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2224-101-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2264-124-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2264-114-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-123-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-134-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-210-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-190-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-192-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-112-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-111-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-122-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2424-156-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-146-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2424-132-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-136-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2424-145-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2740-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2740-56-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2740-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2740-50-0x0000000003270000-0x0000000003384000-memory.dmp

        Filesize

        1.1MB

      • memory/2740-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2740-24-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2740-28-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2828-6-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2828-37-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2828-22-0x00000000032A0000-0x00000000033B4000-memory.dmp

        Filesize

        1.1MB

      • memory/2828-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2828-3-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2828-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2828-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2828-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB