Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 00:06

General

  • Target

    e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01N.exe

  • Size

    8.2MB

  • MD5

    b6d37eb6b47813c679bde3d4bc6fc2e0

  • SHA1

    ad27fb0e1da7ce89ade7df96dd9ed647eab2c649

  • SHA256

    e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01

  • SHA512

    fb502039619e86a5fa1636116d66481fe0ad6dc73c1db291471f362acfea4afcaf593c89e73bbe8e1accdcf762c21fdcd47fbac6eb30acdb36946b95fa7286f2

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8n

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 7 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 7 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01N.exe
    "C:\Users\Admin\AppData\Local\Temp\e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Users\Admin\AppData\Local\Temp\e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01N.exe
      "C:\Users\Admin\AppData\Local\Temp\e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01N.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2812
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2892
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2580
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1676
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2096
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1568
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:872
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1300
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:920
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1652
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1692
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2420
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2156
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2552
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1528
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2268
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:1344
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2752

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        b6d37eb6b47813c679bde3d4bc6fc2e0

        SHA1

        ad27fb0e1da7ce89ade7df96dd9ed647eab2c649

        SHA256

        e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01

        SHA512

        fb502039619e86a5fa1636116d66481fe0ad6dc73c1db291471f362acfea4afcaf593c89e73bbe8e1accdcf762c21fdcd47fbac6eb30acdb36946b95fa7286f2

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        39abb2156d85691e7daa6bc02065401d

        SHA1

        8e94d306b5fcd2a8f08087eae69951cce7db6716

        SHA256

        b783be801a2e529fa59b17d295a4755d2c65ec7cc6cab4ae0e22024be940dd1b

        SHA512

        d181e45b0e60ce998b250abb710ef78b1db0c678b8e885750ff043f615605021128cffd5089a9386ba92ff3c3fd1733d7ace3457fa883779dfe38b8b0e48e812

      • C:\Windows\system\spoolsv.exe

        Filesize

        3.8MB

        MD5

        78fb6d8aab327aa3181ec4a7373beda7

        SHA1

        91289795e2b713300b384b0a1a6b9565f076209f

        SHA256

        ff5cdad69024eed02e26d5fdc22413698baacb06c9ab083a085ac3fb7a46a86e

        SHA512

        5af29311407b33aa2cf3192516e2fe0a445a54d8c6dd2d61ff252032a3ca86e551241a88d433cda7932c9f866c08530beb13d1eece2ebc9e64c343f7ce7761b3

      • \Windows\system\spoolsv.exe

        Filesize

        4.4MB

        MD5

        43636ec9a5b02942df4ff04429b73a06

        SHA1

        1acf4771a710a9f5a1509ad6a99d14aa4ceda2ed

        SHA256

        bd2d97e4ba6cd6ac9a672337799a61a485fe94445be3b2556533c3381753703a

        SHA512

        fea9f4e14b87b95a1d7fc3e0f8f2cac3e4c0ad76cf3eb5c8ce2d4a1f850d99387cabc748dc24f3701a720570d499126aa83b9f5d4b5fba868f85880f5392b5d2

      • \Windows\system\spoolsv.exe

        Filesize

        4.6MB

        MD5

        031d347ff11e1b5368a905feb9bb881d

        SHA1

        c96cae94333d40f9082cc3928eda549a206a3fe3

        SHA256

        7a6a045bdfede5046126917aeb2280e3aee28f3019f05fbd99ca29703aaf9d86

        SHA512

        b41c060573b3f512d21ed7f3013c474808c5fc943aa36cd2d399e02dc8df483f0e0d2b3baeb017cece4934ae726b189e542867361b373ada2e4bd0a74fb55667

      • \Windows\system\spoolsv.exe

        Filesize

        3.8MB

        MD5

        1e63c03ab3dd62b85558db1aa9177098

        SHA1

        d8dd68fd81999d53de30d2ff887a6a68bbe93c8d

        SHA256

        a7577d27c2c8b8a6d67b3c25c70fe7619178a1d1d4771b0909e0c2955f5515bb

        SHA512

        af33bc1a52150c18768be1412e121d60449f11c31885322682f661479f0fa78551fa562183d1ad295ee5710483a5efabf1daca99a4dca117d0908abbc778d197

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        752645da6ba78158009fb8e27b92fb7d

        SHA1

        1a8e04431dfba71b41109ba2b27e4bb80ebf5c42

        SHA256

        741f523cb9dd6ff9af542e35f3ae045bc424d76afd1411946df5c33c1efd0d87

        SHA512

        4b1114ca5eed589bac933702458d885ece7b1145b7c6f498f17091a4545fc574418007a145c2a686904e47ea94ba5660946ad0f8f5b8ebe4859c4de93bd98d89

      • memory/1556-21-0x0000000001FE0000-0x00000000020F4000-memory.dmp

        Filesize

        1.1MB

      • memory/1556-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1556-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1556-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1556-3-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/1556-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1556-36-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1676-99-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1676-98-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1676-120-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2096-121-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2096-111-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2580-157-0x0000000003330000-0x0000000003444000-memory.dmp

        Filesize

        1.1MB

      • memory/2580-131-0x0000000003330000-0x0000000003444000-memory.dmp

        Filesize

        1.1MB

      • memory/2580-118-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2580-110-0x0000000003330000-0x0000000003444000-memory.dmp

        Filesize

        1.1MB

      • memory/2580-130-0x0000000003330000-0x0000000003444000-memory.dmp

        Filesize

        1.1MB

      • memory/2580-129-0x0000000003330000-0x0000000003444000-memory.dmp

        Filesize

        1.1MB

      • memory/2580-140-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2580-183-0x0000000003330000-0x0000000003444000-memory.dmp

        Filesize

        1.1MB

      • memory/2752-32-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2752-28-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2752-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2752-39-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2752-38-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2812-11-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2812-55-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2812-50-0x0000000003320000-0x0000000003434000-memory.dmp

        Filesize

        1.1MB

      • memory/2812-23-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2812-26-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2812-13-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2812-9-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2892-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-51-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-56-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2892-88-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB