Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 08:09

General

  • Target

    70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe

  • Size

    8.2MB

  • MD5

    b1b4052f585c8c0bec92b83ae0f852c0

  • SHA1

    1eb6e50a1436dd1eb5bb63dfb8543a904ea66f09

  • SHA256

    70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824f

  • SHA512

    eb8ec10d6438df4decb098b60d98ca702acfb70216f7f6d389766397f16e173864f141ac0aff595975c8b6e17f071f4dcf5c367f51c49c50e6f9175d415fb832

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecM:V8e8e8f8e8e8J

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 5 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 51 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe
    "C:\Users\Admin\AppData\Local\Temp\70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe
      "C:\Users\Admin\AppData\Local\Temp\70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824fN.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2796
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2644
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:264
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2360
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2212
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1092
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1608
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1744
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1304
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2292
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3024
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:3036
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2452
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:3020
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2180
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 36
              6⤵
              • Program crash
              PID:2508
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:1768
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2908

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        b1b4052f585c8c0bec92b83ae0f852c0

        SHA1

        1eb6e50a1436dd1eb5bb63dfb8543a904ea66f09

        SHA256

        70ce9b2a4a7dd0ad287942cbaa578f2275ee1c89eab2b0579bd25f51f72a824f

        SHA512

        eb8ec10d6438df4decb098b60d98ca702acfb70216f7f6d389766397f16e173864f141ac0aff595975c8b6e17f071f4dcf5c367f51c49c50e6f9175d415fb832

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        ae8f5a0b884fcf17a73dd31f4c1a1fff

        SHA1

        3e85c4a212949c47540398a53c7b37857d93a15b

        SHA256

        0917d57177e3f6e479aca67e64730d8f9e9b65f325e6c7770156f985878e6977

        SHA512

        0ae3df75cb8fd45d233d13fd2262ea19e1dfabc4e0f4e3de448d09f3e1ae64bb729f35fcb4607790017a2cc3804f05482bff98db4a9be867d906ad8598ec1b6b

      • \Windows\system\spoolsv.exe

        Filesize

        8.0MB

        MD5

        abc208622b8b0d31cb2c9c41375ef81f

        SHA1

        135ad9e63326546d8601f755eb166de1f716c206

        SHA256

        9066e2528cea30e7622d5b771599763cedbb9cef3da38a9f9af10ab6fd474bef

        SHA512

        36ee3a1b4bf8130455ef2ac62b513fc58e638deeeeba018ae9f6097686a96cfd439cdcd5c69d61caac68ef37af290c6c0203ff03be4cd572f4cb6ded5db98184

      • \Windows\system\spoolsv.exe

        Filesize

        7.4MB

        MD5

        c8ab4fb11e9131dc08ffd4e8cf4d8fec

        SHA1

        ac0d939e1cbaab85d015f54cee89c8d44ac6da7e

        SHA256

        705e07311df623f93aa1efc18d9a31bbc9e7227a8ec29494460bec6798f51f22

        SHA512

        770d7b8a4e66e69e367fd346fbdcc32f31c37474e94be4368937733c7cdd6fd5aca4f09655e2399aa1409647b257322831cf4d3544e69c4289fb136c953c4cdc

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        6e8bc8f5a1ac23627d1a0e71db15730c

        SHA1

        62726f13db3ac9a923e8fe8f58814721f6af0745

        SHA256

        7554b5a58d3cfe6f402013757f80d3e5c195512737e067673b94df7fbf9f423b

        SHA512

        6a341538dc04dcd5e02507f96eeb6bb705564442a92575e36605890a303673071773afb5dd9f9f6bcbf1af97f0d3d8a38690955acc25c5282c7bf8deba7bfcdf

      • memory/264-136-0x0000000003180000-0x0000000003294000-memory.dmp

        Filesize

        1.1MB

      • memory/264-144-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/264-124-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/264-110-0x0000000003180000-0x0000000003294000-memory.dmp

        Filesize

        1.1MB

      • memory/264-189-0x0000000003180000-0x0000000003294000-memory.dmp

        Filesize

        1.1MB

      • memory/264-173-0x0000000003180000-0x0000000003294000-memory.dmp

        Filesize

        1.1MB

      • memory/264-134-0x0000000003180000-0x0000000003294000-memory.dmp

        Filesize

        1.1MB

      • memory/264-154-0x0000000003180000-0x0000000003294000-memory.dmp

        Filesize

        1.1MB

      • memory/1304-156-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1608-137-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2016-37-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2016-3-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2016-25-0x0000000003130000-0x0000000003244000-memory.dmp

        Filesize

        1.1MB

      • memory/2016-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2016-6-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2016-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2016-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2016-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2180-208-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2212-116-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2212-125-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2360-133-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2360-102-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2360-103-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2360-104-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2644-55-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2644-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2644-59-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2644-92-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2644-51-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2644-50-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2796-26-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2796-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2796-53-0x0000000003250000-0x0000000003364000-memory.dmp

        Filesize

        1.1MB

      • memory/2796-57-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2796-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2796-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2796-52-0x0000000003250000-0x0000000003364000-memory.dmp

        Filesize

        1.1MB

      • memory/2796-18-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2908-27-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2908-58-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2908-40-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2908-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2908-31-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2908-39-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB