Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 09:00
Behavioral task
behavioral1
Sample
ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe
Resource
win10v2004-20241007-en
General
-
Target
ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe
-
Size
8.2MB
-
MD5
ac7cd4068e50fdffc83e99bd1ee89d10
-
SHA1
1e2bfdbce4711d4312dbeef387105b1c3f55c5a9
-
SHA256
ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92
-
SHA512
a026eabf7fd57453ef07057a31e6c6221cd022ce604ae2d1f00ed01c89203888fbb657a543a4fbfd576d5bf486443ca1fe41c81051373aaa083ea212793719c3
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecA:V8e8e8f8e8e8Z
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000016d36-42.dat warzonerat behavioral1/files/0x0008000000016c8c-80.dat warzonerat behavioral1/files/0x0008000000016d47-94.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0008000000016d36-42.dat aspack_v212_v242 behavioral1/files/0x0008000000016c8c-80.dat aspack_v212_v242 behavioral1/files/0x0008000000016d47-94.dat aspack_v212_v242 -
Executes dropped EXE 9 IoCs
pid Process 1816 explorer.exe 688 explorer.exe 2368 spoolsv.exe 2964 spoolsv.exe 960 spoolsv.exe 2520 spoolsv.exe 3000 spoolsv.exe 2080 spoolsv.exe 1728 spoolsv.exe -
Loads dropped DLL 58 IoCs
pid Process 2620 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 2620 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 688 explorer.exe 688 explorer.exe 688 explorer.exe 688 explorer.exe 272 WerFault.exe 272 WerFault.exe 272 WerFault.exe 272 WerFault.exe 272 WerFault.exe 272 WerFault.exe 272 WerFault.exe 688 explorer.exe 688 explorer.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 688 explorer.exe 688 explorer.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 1684 WerFault.exe 688 explorer.exe 688 explorer.exe 1856 WerFault.exe 1856 WerFault.exe 1856 WerFault.exe 1856 WerFault.exe 1856 WerFault.exe 1856 WerFault.exe 1856 WerFault.exe 688 explorer.exe 688 explorer.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 688 explorer.exe 688 explorer.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2704 set thread context of 2620 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 30 PID 2704 set thread context of 2736 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 31 PID 1816 set thread context of 688 1816 explorer.exe 34 PID 1816 set thread context of 2200 1816 explorer.exe 35 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 272 2964 WerFault.exe 37 828 960 WerFault.exe 39 1684 2520 WerFault.exe 41 1856 3000 WerFault.exe 43 1600 2080 WerFault.exe 45 2768 1728 WerFault.exe 47 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2620 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 688 explorer.exe 688 explorer.exe 688 explorer.exe 688 explorer.exe 688 explorer.exe 688 explorer.exe 688 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2620 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 2620 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 688 explorer.exe 688 explorer.exe 688 explorer.exe 688 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2620 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 30 PID 2704 wrote to memory of 2620 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 30 PID 2704 wrote to memory of 2620 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 30 PID 2704 wrote to memory of 2620 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 30 PID 2704 wrote to memory of 2620 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 30 PID 2704 wrote to memory of 2620 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 30 PID 2704 wrote to memory of 2620 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 30 PID 2704 wrote to memory of 2620 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 30 PID 2704 wrote to memory of 2620 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 30 PID 2704 wrote to memory of 2736 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 31 PID 2704 wrote to memory of 2736 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 31 PID 2704 wrote to memory of 2736 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 31 PID 2704 wrote to memory of 2736 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 31 PID 2704 wrote to memory of 2736 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 31 PID 2704 wrote to memory of 2736 2704 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 31 PID 2620 wrote to memory of 1816 2620 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 32 PID 2620 wrote to memory of 1816 2620 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 32 PID 2620 wrote to memory of 1816 2620 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 32 PID 2620 wrote to memory of 1816 2620 ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe 32 PID 1816 wrote to memory of 688 1816 explorer.exe 34 PID 1816 wrote to memory of 688 1816 explorer.exe 34 PID 1816 wrote to memory of 688 1816 explorer.exe 34 PID 1816 wrote to memory of 688 1816 explorer.exe 34 PID 1816 wrote to memory of 688 1816 explorer.exe 34 PID 1816 wrote to memory of 688 1816 explorer.exe 34 PID 1816 wrote to memory of 688 1816 explorer.exe 34 PID 1816 wrote to memory of 688 1816 explorer.exe 34 PID 1816 wrote to memory of 688 1816 explorer.exe 34 PID 1816 wrote to memory of 2200 1816 explorer.exe 35 PID 1816 wrote to memory of 2200 1816 explorer.exe 35 PID 1816 wrote to memory of 2200 1816 explorer.exe 35 PID 1816 wrote to memory of 2200 1816 explorer.exe 35 PID 1816 wrote to memory of 2200 1816 explorer.exe 35 PID 1816 wrote to memory of 2200 1816 explorer.exe 35 PID 688 wrote to memory of 2368 688 explorer.exe 36 PID 688 wrote to memory of 2368 688 explorer.exe 36 PID 688 wrote to memory of 2368 688 explorer.exe 36 PID 688 wrote to memory of 2368 688 explorer.exe 36 PID 688 wrote to memory of 2964 688 explorer.exe 37 PID 688 wrote to memory of 2964 688 explorer.exe 37 PID 688 wrote to memory of 2964 688 explorer.exe 37 PID 688 wrote to memory of 2964 688 explorer.exe 37 PID 2964 wrote to memory of 272 2964 spoolsv.exe 38 PID 2964 wrote to memory of 272 2964 spoolsv.exe 38 PID 2964 wrote to memory of 272 2964 spoolsv.exe 38 PID 2964 wrote to memory of 272 2964 spoolsv.exe 38 PID 688 wrote to memory of 960 688 explorer.exe 39 PID 688 wrote to memory of 960 688 explorer.exe 39 PID 688 wrote to memory of 960 688 explorer.exe 39 PID 688 wrote to memory of 960 688 explorer.exe 39 PID 960 wrote to memory of 828 960 spoolsv.exe 40 PID 960 wrote to memory of 828 960 spoolsv.exe 40 PID 960 wrote to memory of 828 960 spoolsv.exe 40 PID 960 wrote to memory of 828 960 spoolsv.exe 40 PID 688 wrote to memory of 2520 688 explorer.exe 41 PID 688 wrote to memory of 2520 688 explorer.exe 41 PID 688 wrote to memory of 2520 688 explorer.exe 41 PID 688 wrote to memory of 2520 688 explorer.exe 41 PID 2520 wrote to memory of 1684 2520 spoolsv.exe 42 PID 2520 wrote to memory of 1684 2520 spoolsv.exe 42 PID 2520 wrote to memory of 1684 2520 spoolsv.exe 42 PID 2520 wrote to memory of 1684 2520 spoolsv.exe 42 PID 688 wrote to memory of 3000 688 explorer.exe 43 PID 688 wrote to memory of 3000 688 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe"C:\Users\Admin\AppData\Local\Temp\ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe"C:\Users\Admin\AppData\Local\Temp\ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92N.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2368
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 366⤵
- Loads dropped DLL
- Program crash
PID:272
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 366⤵
- Loads dropped DLL
- Program crash
PID:828
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1684
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1856
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1600
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2768
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:2200
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD5ac7cd4068e50fdffc83e99bd1ee89d10
SHA11e2bfdbce4711d4312dbeef387105b1c3f55c5a9
SHA256ada6ee173500985bd12b2912d823477f37237e2482342a8277ccd0b80be72d92
SHA512a026eabf7fd57453ef07057a31e6c6221cd022ce604ae2d1f00ed01c89203888fbb657a543a4fbfd576d5bf486443ca1fe41c81051373aaa083ea212793719c3
-
Filesize
8.2MB
MD566cb7e51948f588cf77283c95d0238a1
SHA106ba0ba1bc76cde91f44fb94c2547b67ecfcb79a
SHA25675b4d16a826ce02c21bfc9ba13006628da03bf6061f5768afb4f9ae0948fbef8
SHA512c57463b31edd36adca8963c1f2039aac4405abe09a0f1e6ceda7067417bf730cfa1a307a4684013fb3b65f2ffffba97b82940cec7d63a7603be54d93b29e1210
-
Filesize
8.2MB
MD58ce97540f63980aa14fba50678f4a9c0
SHA15c10a9f6f71f8f73c6a23d3728d9da208051852b
SHA256d6f86598d94ef80d2d9a864131e3611ea71db0ad91a3fc81cf1832d388d876b8
SHA51241281b4a7853cbff1b51a2c5251da1451f6399b010f0ae1fed520963cd1499036e8c85237d022ae735138a68ac1456bea0bc61b6107a5832373f53a55fdf23c6