Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 23:34
Behavioral task
behavioral1
Sample
8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe
Resource
win10v2004-20241007-en
General
-
Target
8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe
-
Size
8.2MB
-
MD5
26fc81623191418c8da01ceb7cdbe5f0
-
SHA1
de6e130263936e737e67dd548071f941ef3eec4f
-
SHA256
8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660
-
SHA512
9b95ebf2082055208ca3a7450a4bf09b55e944d700cd7e3b012ab80c1353559a374e80fcf25d7347fb23f42a372ef24c205b4e8c6f1413274c00e2224d6770fd
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecl:V8e8e8f8e8e8A
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2876-52-0x00000000032B0000-0x00000000033C4000-memory.dmp warzonerat behavioral1/files/0x00080000000174ac-49.dat warzonerat behavioral1/files/0x000800000001747b-79.dat warzonerat behavioral1/files/0x000a00000001748f-95.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x00080000000174ac-49.dat aspack_v212_v242 behavioral1/files/0x000800000001747b-79.dat aspack_v212_v242 behavioral1/files/0x000a00000001748f-95.dat aspack_v212_v242 -
Executes dropped EXE 9 IoCs
pid Process 1444 explorer.exe 1612 explorer.exe 1544 spoolsv.exe 812 spoolsv.exe 1244 spoolsv.exe 1732 spoolsv.exe 2400 spoolsv.exe 1280 spoolsv.exe 3016 spoolsv.exe -
Loads dropped DLL 58 IoCs
pid Process 2876 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 2876 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1812 WerFault.exe 1812 WerFault.exe 1812 WerFault.exe 1812 WerFault.exe 1812 WerFault.exe 1812 WerFault.exe 1812 WerFault.exe 1612 explorer.exe 1612 explorer.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 1612 explorer.exe 1612 explorer.exe 908 WerFault.exe 908 WerFault.exe 908 WerFault.exe 908 WerFault.exe 908 WerFault.exe 908 WerFault.exe 908 WerFault.exe 1612 explorer.exe 1612 explorer.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 1644 WerFault.exe 1612 explorer.exe 1612 explorer.exe 2548 WerFault.exe 2548 WerFault.exe 2548 WerFault.exe 2548 WerFault.exe 2548 WerFault.exe 2548 WerFault.exe 2548 WerFault.exe 1612 explorer.exe 1612 explorer.exe 3040 WerFault.exe 3040 WerFault.exe 3040 WerFault.exe 3040 WerFault.exe 3040 WerFault.exe 3040 WerFault.exe 3040 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1860 set thread context of 2876 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 31 PID 1860 set thread context of 2816 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 32 PID 1444 set thread context of 1612 1444 explorer.exe 34 PID 1444 set thread context of 2028 1444 explorer.exe 35 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 1812 812 WerFault.exe 37 1880 1244 WerFault.exe 39 908 1732 WerFault.exe 41 1644 2400 WerFault.exe 43 2548 1280 WerFault.exe 45 3040 3016 WerFault.exe 47 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2876 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 2876 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2876 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 31 PID 1860 wrote to memory of 2876 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 31 PID 1860 wrote to memory of 2876 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 31 PID 1860 wrote to memory of 2876 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 31 PID 1860 wrote to memory of 2876 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 31 PID 1860 wrote to memory of 2876 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 31 PID 1860 wrote to memory of 2876 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 31 PID 1860 wrote to memory of 2876 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 31 PID 1860 wrote to memory of 2876 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 31 PID 1860 wrote to memory of 2816 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 32 PID 1860 wrote to memory of 2816 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 32 PID 1860 wrote to memory of 2816 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 32 PID 1860 wrote to memory of 2816 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 32 PID 1860 wrote to memory of 2816 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 32 PID 1860 wrote to memory of 2816 1860 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 32 PID 2876 wrote to memory of 1444 2876 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 33 PID 2876 wrote to memory of 1444 2876 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 33 PID 2876 wrote to memory of 1444 2876 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 33 PID 2876 wrote to memory of 1444 2876 8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe 33 PID 1444 wrote to memory of 1612 1444 explorer.exe 34 PID 1444 wrote to memory of 1612 1444 explorer.exe 34 PID 1444 wrote to memory of 1612 1444 explorer.exe 34 PID 1444 wrote to memory of 1612 1444 explorer.exe 34 PID 1444 wrote to memory of 1612 1444 explorer.exe 34 PID 1444 wrote to memory of 1612 1444 explorer.exe 34 PID 1444 wrote to memory of 1612 1444 explorer.exe 34 PID 1444 wrote to memory of 1612 1444 explorer.exe 34 PID 1444 wrote to memory of 1612 1444 explorer.exe 34 PID 1444 wrote to memory of 2028 1444 explorer.exe 35 PID 1444 wrote to memory of 2028 1444 explorer.exe 35 PID 1444 wrote to memory of 2028 1444 explorer.exe 35 PID 1444 wrote to memory of 2028 1444 explorer.exe 35 PID 1444 wrote to memory of 2028 1444 explorer.exe 35 PID 1444 wrote to memory of 2028 1444 explorer.exe 35 PID 1612 wrote to memory of 1544 1612 explorer.exe 36 PID 1612 wrote to memory of 1544 1612 explorer.exe 36 PID 1612 wrote to memory of 1544 1612 explorer.exe 36 PID 1612 wrote to memory of 1544 1612 explorer.exe 36 PID 1612 wrote to memory of 812 1612 explorer.exe 37 PID 1612 wrote to memory of 812 1612 explorer.exe 37 PID 1612 wrote to memory of 812 1612 explorer.exe 37 PID 1612 wrote to memory of 812 1612 explorer.exe 37 PID 812 wrote to memory of 1812 812 spoolsv.exe 38 PID 812 wrote to memory of 1812 812 spoolsv.exe 38 PID 812 wrote to memory of 1812 812 spoolsv.exe 38 PID 812 wrote to memory of 1812 812 spoolsv.exe 38 PID 1612 wrote to memory of 1244 1612 explorer.exe 39 PID 1612 wrote to memory of 1244 1612 explorer.exe 39 PID 1612 wrote to memory of 1244 1612 explorer.exe 39 PID 1612 wrote to memory of 1244 1612 explorer.exe 39 PID 1244 wrote to memory of 1880 1244 spoolsv.exe 40 PID 1244 wrote to memory of 1880 1244 spoolsv.exe 40 PID 1244 wrote to memory of 1880 1244 spoolsv.exe 40 PID 1244 wrote to memory of 1880 1244 spoolsv.exe 40 PID 1612 wrote to memory of 1732 1612 explorer.exe 41 PID 1612 wrote to memory of 1732 1612 explorer.exe 41 PID 1612 wrote to memory of 1732 1612 explorer.exe 41 PID 1612 wrote to memory of 1732 1612 explorer.exe 41 PID 1732 wrote to memory of 908 1732 spoolsv.exe 42 PID 1732 wrote to memory of 908 1732 spoolsv.exe 42 PID 1732 wrote to memory of 908 1732 spoolsv.exe 42 PID 1732 wrote to memory of 908 1732 spoolsv.exe 42 PID 1612 wrote to memory of 2400 1612 explorer.exe 43 PID 1612 wrote to memory of 2400 1612 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe"C:\Users\Admin\AppData\Local\Temp\8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe"C:\Users\Admin\AppData\Local\Temp\8847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1544
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1812
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1880
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 366⤵
- Loads dropped DLL
- Program crash
PID:908
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1644
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2548
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 366⤵
- Loads dropped DLL
- Program crash
PID:3040
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:2028
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD526fc81623191418c8da01ceb7cdbe5f0
SHA1de6e130263936e737e67dd548071f941ef3eec4f
SHA2568847188c9f46d0e57ec512efb425f209e09588b487f5ea05ed609e4f22981660
SHA5129b95ebf2082055208ca3a7450a4bf09b55e944d700cd7e3b012ab80c1353559a374e80fcf25d7347fb23f42a372ef24c205b4e8c6f1413274c00e2224d6770fd
-
Filesize
8.2MB
MD5b0b19cd391eeb9c37d9f21b75291f90d
SHA147d9da7719026ffc6fe8704a8f8285a7bfe12a3b
SHA25616389876b7ae1402b5a618fcf709996324407367f558604234722f90f274ac13
SHA5123fd90d59955bfc7cf522efc796127509041e8c789cfcac1cd7e1fee7d24bcf237c8011f1171d1bbbf9019e86deaaaf35041b475297225b4aa8c43494d0a4e520
-
Filesize
8.2MB
MD5f08d91cb1b919e4f792a41da50378ce8
SHA1da31a1d177738b857a3431ff006ef4c67baf5a67
SHA2564eb8ba289fc766387592f6f54344a8245de72fa08b69c3225221b7fb23514ccf
SHA5122249d13d939d8d761f4c2551f6e27ff687d051b947e08c93642b827cfca30eb3123542df6262157dfbbc96d5fe17fe9474287e2582292577ac6174c3966bf2b3