Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 04:41

General

  • Target

    ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9.exe

  • Size

    8.2MB

  • MD5

    87f8189455bf33a4a0b16b16f444069f

  • SHA1

    e5b7f2d614929fc8d0964eab9ae80b3f3e486d59

  • SHA256

    ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9

  • SHA512

    d31a66a02b6355ca7f841fcba388b9e8e49aad37b77f6c1be2a2728939de0941bac2c94646528c5e069ce41f42c433152bc6641b8cac2abd1de5e7b7d6221fad

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecw:V8e8e8f8e8e8n

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9.exe
    "C:\Users\Admin\AppData\Local\Temp\ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9.exe
      "C:\Users\Admin\AppData\Local\Temp\ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2604
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1100
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1816
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:2528
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              6⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2668
              • \??\c:\windows\system\svchost.exe
                c:\windows\system\svchost.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:564
            • C:\Windows\SysWOW64\diskperf.exe
              "C:\Windows\SysWOW64\diskperf.exe"
              6⤵
                PID:2984
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2132
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2184
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1808
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1140
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1360
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1356
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:952
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1328
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2908
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1760
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1596
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:3064
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:880
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2704
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2900
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 36
                6⤵
                • Program crash
                PID:2688
          • C:\Windows\SysWOW64\diskperf.exe
            "C:\Windows\SysWOW64\diskperf.exe"
            4⤵
              PID:1856
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          2⤵
            PID:2980

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

          Filesize

          8.2MB

          MD5

          87f8189455bf33a4a0b16b16f444069f

          SHA1

          e5b7f2d614929fc8d0964eab9ae80b3f3e486d59

          SHA256

          ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9

          SHA512

          d31a66a02b6355ca7f841fcba388b9e8e49aad37b77f6c1be2a2728939de0941bac2c94646528c5e069ce41f42c433152bc6641b8cac2abd1de5e7b7d6221fad

        • C:\Windows\system\explorer.exe

          Filesize

          8.2MB

          MD5

          69a502f0be046110f5e3705693f0a2b7

          SHA1

          e0f22464a53fd36a3726c3fedb3d64e5f2d1fec9

          SHA256

          d8896bdd9dfddabd2a423266fbb6f246f7bfee490ec317dd5a212bf982b3c4f8

          SHA512

          a96eb7f42aefe6e9eea15bb3b17f1567276dcb2b74886ae512db7277259039a9c8eceb18af28b6fda650c33e1ffad3ea7a731663cbc9b6f06c1c6f4b79f17d54

        • \Windows\system\spoolsv.exe

          Filesize

          8.2MB

          MD5

          5d1aef9c0fd1fd80577aee90b079a9c7

          SHA1

          e3657719073b12a2774f1ec7fb294bfd1d609d8a

          SHA256

          931c7a0a40f167f988dc185cce39ff26e687a9b1de2a8d3b831f5112398a9bd5

          SHA512

          c8c0dc7dac4f28e34400dbd6a26132e6c33a4602b51c1282cfb0d614237298d9f48209e2d01f169ff3d39ec8ad643d0581bd5d6dde83002ccf89f0132f21f301

        • memory/564-261-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/564-253-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1100-90-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1100-58-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1100-55-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1100-53-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1100-54-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1100-52-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1808-137-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1816-134-0x0000000003050000-0x0000000003164000-memory.dmp

          Filesize

          1.1MB

        • memory/1816-114-0x0000000003050000-0x0000000003164000-memory.dmp

          Filesize

          1.1MB

        • memory/1816-263-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1816-206-0x0000000003050000-0x0000000003164000-memory.dmp

          Filesize

          1.1MB

        • memory/1816-190-0x0000000003050000-0x0000000003164000-memory.dmp

          Filesize

          1.1MB

        • memory/1816-164-0x0000000003050000-0x0000000003164000-memory.dmp

          Filesize

          1.1MB

        • memory/1816-147-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1816-145-0x0000000003050000-0x0000000003164000-memory.dmp

          Filesize

          1.1MB

        • memory/1816-146-0x0000000003050000-0x0000000003164000-memory.dmp

          Filesize

          1.1MB

        • memory/1816-133-0x0000000003050000-0x0000000003164000-memory.dmp

          Filesize

          1.1MB

        • memory/1816-124-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1816-113-0x0000000003050000-0x0000000003164000-memory.dmp

          Filesize

          1.1MB

        • memory/2132-116-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2132-125-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2252-1-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2252-2-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2252-6-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2252-4-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2252-40-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2252-21-0x00000000031C0000-0x00000000032D4000-memory.dmp

          Filesize

          1.1MB

        • memory/2252-0-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2252-3-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2528-136-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2528-102-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2528-245-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2528-101-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2528-103-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2604-49-0x00000000032D0000-0x00000000033E4000-memory.dmp

          Filesize

          1.1MB

        • memory/2604-57-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2604-50-0x00000000032D0000-0x00000000033E4000-memory.dmp

          Filesize

          1.1MB

        • memory/2604-12-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2604-14-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2604-23-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2604-10-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2604-27-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2668-254-0x0000000003170000-0x0000000003284000-memory.dmp

          Filesize

          1.1MB

        • memory/2668-259-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2908-191-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2980-37-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2980-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2980-36-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2980-34-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2980-30-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB