Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/12/2024, 17:48
Behavioral task
behavioral1
Sample
db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe
Resource
win10v2004-20241007-en
General
-
Target
db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe
-
Size
8.2MB
-
MD5
93943cb09d93aa04e31de91e9c00ba00
-
SHA1
17a641205716ec84c83425cd30e351d2a5a8ea86
-
SHA256
db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887
-
SHA512
d963f6d5be2221ac211f40c60515a9635d0d55f127c13d883359aa220a161d60c66dd3f449d1fea6f7f1fbdb05143fb3e36035745368a62012f33de944421e28
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecR:V8e8e8f8e8e8M
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000015f38-41.dat warzonerat behavioral1/files/0x0008000000015dac-78.dat warzonerat behavioral1/files/0x0008000000015fa6-92.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0009000000015f38-41.dat aspack_v212_v242 behavioral1/files/0x0008000000015dac-78.dat aspack_v212_v242 behavioral1/files/0x0008000000015fa6-92.dat aspack_v212_v242 -
Executes dropped EXE 9 IoCs
pid Process 1408 explorer.exe 2840 explorer.exe 2268 spoolsv.exe 1932 spoolsv.exe 1532 spoolsv.exe 832 spoolsv.exe 2012 spoolsv.exe 2264 spoolsv.exe 3036 spoolsv.exe -
Loads dropped DLL 58 IoCs
pid Process 2680 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 2680 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 952 WerFault.exe 952 WerFault.exe 952 WerFault.exe 952 WerFault.exe 952 WerFault.exe 952 WerFault.exe 952 WerFault.exe 2840 explorer.exe 2840 explorer.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 2840 explorer.exe 2840 explorer.exe 1236 WerFault.exe 1236 WerFault.exe 1236 WerFault.exe 1236 WerFault.exe 1236 WerFault.exe 1236 WerFault.exe 1236 WerFault.exe 2840 explorer.exe 2840 explorer.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 2840 explorer.exe 2840 explorer.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 996 WerFault.exe 2840 explorer.exe 2840 explorer.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe 1492 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2136 set thread context of 2680 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 30 PID 2136 set thread context of 2604 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 31 PID 1408 set thread context of 2840 1408 explorer.exe 34 PID 1408 set thread context of 1916 1408 explorer.exe 35 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 952 1932 WerFault.exe 37 1724 1532 WerFault.exe 39 1236 832 WerFault.exe 41 1920 2012 WerFault.exe 43 996 2264 WerFault.exe 45 1492 3036 WerFault.exe 47 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2680 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 2680 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe 2840 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2680 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 30 PID 2136 wrote to memory of 2680 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 30 PID 2136 wrote to memory of 2680 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 30 PID 2136 wrote to memory of 2680 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 30 PID 2136 wrote to memory of 2680 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 30 PID 2136 wrote to memory of 2680 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 30 PID 2136 wrote to memory of 2680 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 30 PID 2136 wrote to memory of 2680 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 30 PID 2136 wrote to memory of 2680 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 30 PID 2136 wrote to memory of 2604 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 31 PID 2136 wrote to memory of 2604 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 31 PID 2136 wrote to memory of 2604 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 31 PID 2136 wrote to memory of 2604 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 31 PID 2136 wrote to memory of 2604 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 31 PID 2136 wrote to memory of 2604 2136 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 31 PID 2680 wrote to memory of 1408 2680 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 32 PID 2680 wrote to memory of 1408 2680 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 32 PID 2680 wrote to memory of 1408 2680 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 32 PID 2680 wrote to memory of 1408 2680 db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe 32 PID 1408 wrote to memory of 2840 1408 explorer.exe 34 PID 1408 wrote to memory of 2840 1408 explorer.exe 34 PID 1408 wrote to memory of 2840 1408 explorer.exe 34 PID 1408 wrote to memory of 2840 1408 explorer.exe 34 PID 1408 wrote to memory of 2840 1408 explorer.exe 34 PID 1408 wrote to memory of 2840 1408 explorer.exe 34 PID 1408 wrote to memory of 2840 1408 explorer.exe 34 PID 1408 wrote to memory of 2840 1408 explorer.exe 34 PID 1408 wrote to memory of 2840 1408 explorer.exe 34 PID 1408 wrote to memory of 1916 1408 explorer.exe 35 PID 1408 wrote to memory of 1916 1408 explorer.exe 35 PID 1408 wrote to memory of 1916 1408 explorer.exe 35 PID 1408 wrote to memory of 1916 1408 explorer.exe 35 PID 1408 wrote to memory of 1916 1408 explorer.exe 35 PID 1408 wrote to memory of 1916 1408 explorer.exe 35 PID 2840 wrote to memory of 2268 2840 explorer.exe 36 PID 2840 wrote to memory of 2268 2840 explorer.exe 36 PID 2840 wrote to memory of 2268 2840 explorer.exe 36 PID 2840 wrote to memory of 2268 2840 explorer.exe 36 PID 2840 wrote to memory of 1932 2840 explorer.exe 37 PID 2840 wrote to memory of 1932 2840 explorer.exe 37 PID 2840 wrote to memory of 1932 2840 explorer.exe 37 PID 2840 wrote to memory of 1932 2840 explorer.exe 37 PID 1932 wrote to memory of 952 1932 spoolsv.exe 38 PID 1932 wrote to memory of 952 1932 spoolsv.exe 38 PID 1932 wrote to memory of 952 1932 spoolsv.exe 38 PID 1932 wrote to memory of 952 1932 spoolsv.exe 38 PID 2840 wrote to memory of 1532 2840 explorer.exe 39 PID 2840 wrote to memory of 1532 2840 explorer.exe 39 PID 2840 wrote to memory of 1532 2840 explorer.exe 39 PID 2840 wrote to memory of 1532 2840 explorer.exe 39 PID 1532 wrote to memory of 1724 1532 spoolsv.exe 40 PID 1532 wrote to memory of 1724 1532 spoolsv.exe 40 PID 1532 wrote to memory of 1724 1532 spoolsv.exe 40 PID 1532 wrote to memory of 1724 1532 spoolsv.exe 40 PID 2840 wrote to memory of 832 2840 explorer.exe 41 PID 2840 wrote to memory of 832 2840 explorer.exe 41 PID 2840 wrote to memory of 832 2840 explorer.exe 41 PID 2840 wrote to memory of 832 2840 explorer.exe 41 PID 832 wrote to memory of 1236 832 spoolsv.exe 42 PID 832 wrote to memory of 1236 832 spoolsv.exe 42 PID 832 wrote to memory of 1236 832 spoolsv.exe 42 PID 832 wrote to memory of 1236 832 spoolsv.exe 42 PID 2840 wrote to memory of 2012 2840 explorer.exe 43 PID 2840 wrote to memory of 2012 2840 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe"C:\Users\Admin\AppData\Local\Temp\db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe"C:\Users\Admin\AppData\Local\Temp\db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2268
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 366⤵
- Loads dropped DLL
- Program crash
PID:952
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1724
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1236
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1920
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 366⤵
- Loads dropped DLL
- Program crash
PID:996
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1492
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:1916
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD593943cb09d93aa04e31de91e9c00ba00
SHA117a641205716ec84c83425cd30e351d2a5a8ea86
SHA256db1bedf0288baa1f3a680ebc611780cd9cf939937e53ceaba0aef29f6730a887
SHA512d963f6d5be2221ac211f40c60515a9635d0d55f127c13d883359aa220a161d60c66dd3f449d1fea6f7f1fbdb05143fb3e36035745368a62012f33de944421e28
-
Filesize
8.2MB
MD52a4817fa649ba6c239ca7f14585224dd
SHA11238f9f5cc91556af29fc5e5254b915cb9c2a8a1
SHA25656942cd3b954d9f69151543cf6a251f8804d384b6a700d3dcbd341a707ffb16e
SHA5124780d5b515b6137a954395a601296c6694f6613ba57273fa1e026db05c7de6c3093d8e83f3a95752bd02424c8fde06e5d0428b81249eebd9929f93ffed5ba01b
-
Filesize
8.2MB
MD5be6b15b132bdfe74f1654d13df0c55d4
SHA1fb00f356c53464e0f71974e198aecc1967dd0500
SHA2563c5ef15a16c1c922b0f54fa6d65342f16af602556419f2ef9b0b9fafa870618b
SHA51269acd6f0febd5151d298c0a08c1e3958195319ece745d999a45a0b262b1c9bfd9a9bb556bc2a01da17ea7a498683798dff11157261476db08fc4028b835841a0