Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 03:56

General

  • Target

    d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe

  • Size

    8.2MB

  • MD5

    bfe0d841dfadacd6b4562ee52be58440

  • SHA1

    622520eb08f30a771fe385a6c22605664ec52ec1

  • SHA256

    d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152e

  • SHA512

    ce43fd0e20dbf25eb7fbda1d3f19ff2028282c2cdf58b8a3aa5e976ea2d2fc2c4bb7aa3c433c4c12df92bb58f39c38b44f7c7e993741af1ee4f90bacc6534ac6

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecM:V8e8e8f8e8e8l

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe
    "C:\Users\Admin\AppData\Local\Temp\d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Users\Admin\AppData\Local\Temp\d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe
      "C:\Users\Admin\AppData\Local\Temp\d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152eN.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2556
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1704
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2420
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2128
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2220
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2428
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2652
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1348
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2208
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2408
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1204
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1508
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2632
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2236
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2988
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:628
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:592

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        bfe0d841dfadacd6b4562ee52be58440

        SHA1

        622520eb08f30a771fe385a6c22605664ec52ec1

        SHA256

        d950e3945416c9a20a1affc6f4a56ac7594302973a4fe0e6075e370f9841152e

        SHA512

        ce43fd0e20dbf25eb7fbda1d3f19ff2028282c2cdf58b8a3aa5e976ea2d2fc2c4bb7aa3c433c4c12df92bb58f39c38b44f7c7e993741af1ee4f90bacc6534ac6

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        0dc21756985403df5b69b71430ffbbe4

        SHA1

        861c7797d35978d666175c06f036f045368c6c3a

        SHA256

        b863631f7065625da9f45a05112344623435f67bbe1ca11e71092c0d3f4df883

        SHA512

        8c681d42e586ef056932c1f3571448f2240b0eb2affc86bea72ebd4f02d2766664336611681451ed3ec4e316b4c7d05c600927f8c28e143e31b1bc9a352c6866

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        d2fd906b00365671f0cb60e88047d27c

        SHA1

        6cf1cd507c17f7adcf75cdbe65113773ea9d69fb

        SHA256

        41f73a7682883f790b9e6d907a68a578d9f2a0ad78f6cda9715c8e893cb085a6

        SHA512

        5c4a8722f39d4289db4ab921afc5d98c5f483d96a07cfc00bd40148fb61ebd744d4d793b46a3c4b20c4a0a637bc694b69e2afccfc9058b0820bdf04d09918c86

      • memory/592-40-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/592-30-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/592-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/592-34-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/592-38-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/1348-161-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1508-196-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1704-59-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1704-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1704-91-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1704-55-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1704-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2128-104-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2128-103-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2128-137-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2220-117-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2220-126-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-147-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-134-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-116-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-177-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-157-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-158-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-160-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-148-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2420-135-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-96-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-101-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-136-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-138-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-114-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-194-0x00000000030D0000-0x00000000031E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2420-125-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2556-58-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2556-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2556-50-0x00000000033E0000-0x00000000034F4000-memory.dmp

        Filesize

        1.1MB

      • memory/2556-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2556-27-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2556-24-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2556-51-0x00000000033E0000-0x00000000034F4000-memory.dmp

        Filesize

        1.1MB

      • memory/2556-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2944-39-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2944-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2944-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2944-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2944-6-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2944-3-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2944-22-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/2944-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB