Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 22:30
Behavioral task
behavioral1
Sample
d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe
Resource
win10v2004-20241007-en
General
-
Target
d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe
-
Size
8.2MB
-
MD5
1515cba84fe567867eaf6cb63c87c690
-
SHA1
0680e7af80fbff5a26c1376e2dac723d684c8eee
-
SHA256
d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1c
-
SHA512
4e6a50adf77ef91184727e7932c1f0229eac28eda2711b11b19ab82e4bf4afa96bdbc0975dda6f071cca235c6cc4afde01ca80b35f82eced0a2bafe2d44b98b3
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecU:V8e8e8f8e8e83
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000016d36-42.dat warzonerat behavioral1/files/0x0008000000016d24-77.dat warzonerat behavioral1/files/0x0008000000016d50-93.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0009000000016d36-42.dat aspack_v212_v242 behavioral1/files/0x0008000000016d24-77.dat aspack_v212_v242 behavioral1/files/0x0008000000016d50-93.dat aspack_v212_v242 -
Executes dropped EXE 9 IoCs
pid Process 2088 explorer.exe 3068 explorer.exe 1260 spoolsv.exe 2112 spoolsv.exe 2056 spoolsv.exe 1492 spoolsv.exe 2208 spoolsv.exe 1512 spoolsv.exe 1720 spoolsv.exe -
Loads dropped DLL 58 IoCs
pid Process 2848 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 2848 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 2388 WerFault.exe 3068 explorer.exe 3068 explorer.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 352 WerFault.exe 3068 explorer.exe 3068 explorer.exe 1776 WerFault.exe 1776 WerFault.exe 1776 WerFault.exe 1776 WerFault.exe 1776 WerFault.exe 1776 WerFault.exe 1776 WerFault.exe 3068 explorer.exe 3068 explorer.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 3068 explorer.exe 3068 explorer.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 3068 explorer.exe 3068 explorer.exe 2432 WerFault.exe 2432 WerFault.exe 2432 WerFault.exe 2432 WerFault.exe 2432 WerFault.exe 2432 WerFault.exe 2432 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2392 set thread context of 2848 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 31 PID 2392 set thread context of 1932 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 32 PID 2088 set thread context of 3068 2088 explorer.exe 35 PID 2088 set thread context of 2440 2088 explorer.exe 36 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2388 2112 WerFault.exe 38 352 2056 WerFault.exe 40 1776 1492 WerFault.exe 42 1572 2208 WerFault.exe 2628 1512 WerFault.exe 46 2432 1720 WerFault.exe 48 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2848 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 2848 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe 3068 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2848 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 31 PID 2392 wrote to memory of 2848 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 31 PID 2392 wrote to memory of 2848 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 31 PID 2392 wrote to memory of 2848 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 31 PID 2392 wrote to memory of 2848 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 31 PID 2392 wrote to memory of 2848 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 31 PID 2392 wrote to memory of 2848 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 31 PID 2392 wrote to memory of 2848 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 31 PID 2392 wrote to memory of 2848 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 31 PID 2392 wrote to memory of 1932 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 32 PID 2392 wrote to memory of 1932 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 32 PID 2392 wrote to memory of 1932 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 32 PID 2392 wrote to memory of 1932 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 32 PID 2392 wrote to memory of 1932 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 32 PID 2392 wrote to memory of 1932 2392 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 32 PID 2848 wrote to memory of 2088 2848 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 33 PID 2848 wrote to memory of 2088 2848 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 33 PID 2848 wrote to memory of 2088 2848 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 33 PID 2848 wrote to memory of 2088 2848 d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe 33 PID 2088 wrote to memory of 3068 2088 explorer.exe 35 PID 2088 wrote to memory of 3068 2088 explorer.exe 35 PID 2088 wrote to memory of 3068 2088 explorer.exe 35 PID 2088 wrote to memory of 3068 2088 explorer.exe 35 PID 2088 wrote to memory of 3068 2088 explorer.exe 35 PID 2088 wrote to memory of 3068 2088 explorer.exe 35 PID 2088 wrote to memory of 3068 2088 explorer.exe 35 PID 2088 wrote to memory of 3068 2088 explorer.exe 35 PID 2088 wrote to memory of 3068 2088 explorer.exe 35 PID 2088 wrote to memory of 2440 2088 explorer.exe 36 PID 2088 wrote to memory of 2440 2088 explorer.exe 36 PID 2088 wrote to memory of 2440 2088 explorer.exe 36 PID 2088 wrote to memory of 2440 2088 explorer.exe 36 PID 2088 wrote to memory of 2440 2088 explorer.exe 36 PID 2088 wrote to memory of 2440 2088 explorer.exe 36 PID 3068 wrote to memory of 1260 3068 explorer.exe 37 PID 3068 wrote to memory of 1260 3068 explorer.exe 37 PID 3068 wrote to memory of 1260 3068 explorer.exe 37 PID 3068 wrote to memory of 1260 3068 explorer.exe 37 PID 3068 wrote to memory of 2112 3068 explorer.exe 38 PID 3068 wrote to memory of 2112 3068 explorer.exe 38 PID 3068 wrote to memory of 2112 3068 explorer.exe 38 PID 3068 wrote to memory of 2112 3068 explorer.exe 38 PID 2112 wrote to memory of 2388 2112 spoolsv.exe 39 PID 2112 wrote to memory of 2388 2112 spoolsv.exe 39 PID 2112 wrote to memory of 2388 2112 spoolsv.exe 39 PID 2112 wrote to memory of 2388 2112 spoolsv.exe 39 PID 3068 wrote to memory of 2056 3068 explorer.exe 40 PID 3068 wrote to memory of 2056 3068 explorer.exe 40 PID 3068 wrote to memory of 2056 3068 explorer.exe 40 PID 3068 wrote to memory of 2056 3068 explorer.exe 40 PID 2056 wrote to memory of 352 2056 spoolsv.exe 41 PID 2056 wrote to memory of 352 2056 spoolsv.exe 41 PID 2056 wrote to memory of 352 2056 spoolsv.exe 41 PID 2056 wrote to memory of 352 2056 spoolsv.exe 41 PID 3068 wrote to memory of 1492 3068 explorer.exe 42 PID 3068 wrote to memory of 1492 3068 explorer.exe 42 PID 3068 wrote to memory of 1492 3068 explorer.exe 42 PID 3068 wrote to memory of 1492 3068 explorer.exe 42 PID 1492 wrote to memory of 1776 1492 spoolsv.exe 43 PID 1492 wrote to memory of 1776 1492 spoolsv.exe 43 PID 1492 wrote to memory of 1776 1492 spoolsv.exe 43 PID 1492 wrote to memory of 1776 1492 spoolsv.exe 43 PID 3068 wrote to memory of 2208 3068 explorer.exe 44 PID 3068 wrote to memory of 2208 3068 explorer.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe"C:\Users\Admin\AppData\Local\Temp\d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe"C:\Users\Admin\AppData\Local\Temp\d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1cN.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1260
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2388
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 366⤵
- Loads dropped DLL
- Program crash
PID:352
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1776
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1572
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2432
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:2440
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD51515cba84fe567867eaf6cb63c87c690
SHA10680e7af80fbff5a26c1376e2dac723d684c8eee
SHA256d61f00ee897116933dfceb5c7eaba3e41a9396ba25cc77ae6e891780359abb1c
SHA5124e6a50adf77ef91184727e7932c1f0229eac28eda2711b11b19ab82e4bf4afa96bdbc0975dda6f071cca235c6cc4afde01ca80b35f82eced0a2bafe2d44b98b3
-
Filesize
8.2MB
MD538bd49e4a5deea6423e6d576acdd82c9
SHA1359e3d47edf25cc516119f6030ea20f4de8a083d
SHA256c14bf601fafbc1c223bd45b9e3a8f4b462a73c40d59bb29cfc11db0e6bedbb14
SHA512f059477f83c5a176d1660bf616cf9865f603e21e2ec22aa64c78162915d66bbe6538df4b0f55c6cde378e602cd1e1c715dd6c217392ffc9bd15ff44dbf6f1a1e
-
Filesize
8.2MB
MD5035275178bb49a34570fe94a71c43d49
SHA1f0d11371020360c58a138e44c295e0d5204e7950
SHA25676b20a8e23edd91daac1a0a7ffd3c84f176c257b87e02bdb5e33b52734321a3f
SHA512fb2365815fc4f5188e5a294e2e3b2e89e3104df3f13c74065a3a32a8a64b0baad05e0c842257172b5319b36f847f419c2dd3f98e686ca82512b4954a57ffffb2