Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 03:17

General

  • Target

    dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ecN.exe

  • Size

    8.2MB

  • MD5

    eb52abc1455500d88c5be15fdf6ee840

  • SHA1

    7bf903b41e613889012c2bfe35b980f161a92910

  • SHA256

    dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ec

  • SHA512

    76784766311c2f569e0f797a086a18af1e5f791a3af66ff5407ddb3ccedd80e4b5093a3980d45731573df15fd025c6811e9e28a0d8e9efcf2872288b5e8b6794

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecx:V8e8e8f8e8e8K

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ecN.exe
    "C:\Users\Admin\AppData\Local\Temp\dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ecN.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ecN.exe
      "C:\Users\Admin\AppData\Local\Temp\dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ecN.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2752
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2636
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1788
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1592
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2160
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2216
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:316
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1660
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1956
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1808
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2292
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2240
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1508
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2956
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2552
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:2384
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2948

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        eb52abc1455500d88c5be15fdf6ee840

        SHA1

        7bf903b41e613889012c2bfe35b980f161a92910

        SHA256

        dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ec

        SHA512

        76784766311c2f569e0f797a086a18af1e5f791a3af66ff5407ddb3ccedd80e4b5093a3980d45731573df15fd025c6811e9e28a0d8e9efcf2872288b5e8b6794

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        b5c8e7809abd78e20038b6a0a0747db7

        SHA1

        4e79dfbc99d368e438abd106ed8833ff3796ddd5

        SHA256

        c7da0ece9b27d62a248c89a273dadcff67d3a5f55f3b0ccda811615af52216b1

        SHA512

        b53fda5f82f6c29b6297f306af8e6884554e389f8a12c418453e58f82885355898c97e1cf2b0d32ad5cbfbc2724a4f95736e900d869923fc02426ba444ad4f6d

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        ee1c6e95222588b8150705e2e066290d

        SHA1

        a35ed40825e10147386611c8a748bef8507a36bd

        SHA256

        fbabb45556df58e3d0b3a40635142ae076511a7a8c0da22d0d4d3fa8d7c81b26

        SHA512

        00bed8f8a689a5bd094b698cac643078e50e4a96c05c8a43ceb1eb65b691bbef9fd1ca4a633df6945e0609fbc0eff174df8a409a2839a9a525ba04c2b4b13483

      • memory/1288-38-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1288-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1288-6-0x00000000003A0000-0x00000000003A1000-memory.dmp

        Filesize

        4KB

      • memory/1288-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1288-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1288-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1288-3-0x00000000003A0000-0x00000000003A1000-memory.dmp

        Filesize

        4KB

      • memory/1592-102-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1592-100-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1592-134-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1592-101-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1788-113-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1788-151-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1788-112-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1788-94-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1788-122-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1788-142-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1788-133-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1788-152-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1788-154-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1808-170-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2636-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2636-86-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2636-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2636-51-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2752-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2752-56-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2752-49-0x00000000031F0000-0x0000000003304000-memory.dmp

        Filesize

        1.1MB

      • memory/2752-18-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2752-50-0x00000000031F0000-0x0000000003304000-memory.dmp

        Filesize

        1.1MB

      • memory/2752-24-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2752-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2752-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2948-32-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2948-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2948-28-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2948-39-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2948-35-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/3036-124-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/3036-115-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB