Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 09:00

General

  • Target

    ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe

  • Size

    8.2MB

  • MD5

    ac7cd4068e50fdffc83e99bd1ee89d10

  • SHA1

    1e2bfdbce4711d4312dbeef387105b1c3f55c5a9

  • SHA256

    ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92

  • SHA512

    a026eabf7fd57453ef07057a31e6c6221cd022ce604ae2d1f00ed01c89203888fbb657a543a4fbfd576d5bf486443ca1fe41c81051373aaa083ea212793719c3

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecA:V8e8e8f8e8e8Z

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe
    "C:\Users\Admin\AppData\Local\Temp\ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Users\Admin\AppData\Local\Temp\ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe
      "C:\Users\Admin\AppData\Local\Temp\ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2620
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1816
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:688
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2368
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2964
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:272
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:960
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:828
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2520
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1684
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3000
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1856
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2080
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1600
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1728
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2768
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:2200
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2736

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        ac7cd4068e50fdffc83e99bd1ee89d10

        SHA1

        1e2bfdbce4711d4312dbeef387105b1c3f55c5a9

        SHA256

        ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92

        SHA512

        a026eabf7fd57453ef07057a31e6c6221cd022ce604ae2d1f00ed01c89203888fbb657a543a4fbfd576d5bf486443ca1fe41c81051373aaa083ea212793719c3

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        66cb7e51948f588cf77283c95d0238a1

        SHA1

        06ba0ba1bc76cde91f44fb94c2547b67ecfcb79a

        SHA256

        75b4d16a826ce02c21bfc9ba13006628da03bf6061f5768afb4f9ae0948fbef8

        SHA512

        c57463b31edd36adca8963c1f2039aac4405abe09a0f1e6ceda7067417bf730cfa1a307a4684013fb3b65f2ffffba97b82940cec7d63a7603be54d93b29e1210

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        8ce97540f63980aa14fba50678f4a9c0

        SHA1

        5c10a9f6f71f8f73c6a23d3728d9da208051852b

        SHA256

        d6f86598d94ef80d2d9a864131e3611ea71db0ad91a3fc81cf1832d388d876b8

        SHA512

        41281b4a7853cbff1b51a2c5251da1451f6399b010f0ae1fed520963cd1499036e8c85237d022ae735138a68ac1456bea0bc61b6107a5832373f53a55fdf23c6

      • memory/688-124-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/688-142-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/688-132-0x00000000033E0000-0x00000000034F4000-memory.dmp

        Filesize

        1.1MB

      • memory/688-152-0x00000000033E0000-0x00000000034F4000-memory.dmp

        Filesize

        1.1MB

      • memory/688-113-0x00000000033E0000-0x00000000034F4000-memory.dmp

        Filesize

        1.1MB

      • memory/688-114-0x00000000033E0000-0x00000000034F4000-memory.dmp

        Filesize

        1.1MB

      • memory/688-96-0x00000000033E0000-0x00000000034F4000-memory.dmp

        Filesize

        1.1MB

      • memory/688-151-0x00000000033E0000-0x00000000034F4000-memory.dmp

        Filesize

        1.1MB

      • memory/688-168-0x00000000033E0000-0x00000000034F4000-memory.dmp

        Filesize

        1.1MB

      • memory/688-91-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1816-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1816-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1816-90-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1816-59-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1816-55-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1816-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2368-141-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2368-103-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2368-102-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2620-31-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2620-50-0x00000000033B0000-0x00000000034C4000-memory.dmp

        Filesize

        1.1MB

      • memory/2620-18-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2620-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2620-45-0x00000000033B0000-0x00000000034C4000-memory.dmp

        Filesize

        1.1MB

      • memory/2620-56-0x00000000004E0000-0x0000000000520000-memory.dmp

        Filesize

        256KB

      • memory/2620-57-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2620-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2620-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2704-37-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2704-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2704-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2704-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2704-3-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2704-25-0x0000000003260000-0x0000000003374000-memory.dmp

        Filesize

        1.1MB

      • memory/2704-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2704-6-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2736-26-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2736-30-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2736-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2736-58-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2736-38-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2736-39-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2964-116-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB