Analysis

  • max time kernel
    119s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 03:05

General

  • Target

    22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe

  • Size

    8.2MB

  • MD5

    5b38b3b2a571a945db7ef36cedf360a0

  • SHA1

    d8c31282b5842d0a4c8c4842c70690e52a79b700

  • SHA256

    22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edc

  • SHA512

    7f053766692102ab9aa74e5daa2253649b4abdf407702bb9685f4c0d4dfb324d90a4d687578d4e264be502c894e3f91a80a2e7087dda453ff1a29166bdebf57f

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecH:V8e8e8f8e8e8Y

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 6 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 42 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe
    "C:\Users\Admin\AppData\Local\Temp\22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe
      "C:\Users\Admin\AppData\Local\Temp\22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2756
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2656
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2012
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2956
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1868
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2280
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3012
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1940
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2288
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:280
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2568
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1700
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            PID:1300
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:2920
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2884

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        5b38b3b2a571a945db7ef36cedf360a0

        SHA1

        d8c31282b5842d0a4c8c4842c70690e52a79b700

        SHA256

        22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edc

        SHA512

        7f053766692102ab9aa74e5daa2253649b4abdf407702bb9685f4c0d4dfb324d90a4d687578d4e264be502c894e3f91a80a2e7087dda453ff1a29166bdebf57f

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        340318afe698c39488b5b93f20d3de15

        SHA1

        783bd26f410a5016d49bc38d815d892a9e46bc6c

        SHA256

        e2e1a22b6a7459229811bdfb70f9459b5d28110b46305596170abe56d42229b9

        SHA512

        ebb49c31d4dae37992b6303f87ae138256265f0c27f1b3275109b6d74514a09b1093130b32799518a6b65d7c6025380df004229b0f57fcf826cb68e790e4976e

      • C:\Windows\system\spoolsv.exe

        Filesize

        6.6MB

        MD5

        19bdaeea53223940b8a7113651d9d9de

        SHA1

        5217069a7c64d6bb855300c3bb1c6541b089694e

        SHA256

        393a2e914a976d918689586e4ba4bcc52188da4e62e388c63b90ec7d29f3aaab

        SHA512

        7a5384206b3c42b5075cf96f019bac833481ff3f455f9ef2392c60dae05f3018c1b30db2d1b44bacf1030cfc23eaecfa87fcf3f6b92841a66d6ee3eebd022d63

      • \Windows\system\spoolsv.exe

        Filesize

        7.2MB

        MD5

        4012d263ef92c5881d0abfc3f06a86bd

        SHA1

        2410c2111a88f446bb6cf3cfd48bd22493c08f43

        SHA256

        6094e882d5ca77381ffa35892856126aee9dc5b34e7a0ea0a4c65ffde0dcecbb

        SHA512

        4eda592db187265c64eb44f9b3c660781ee142d2f735a5b35b7a4d5713a68fb1cf91a2dc527bbdb17b33935038eb11c0008703b3e454b7986424f4cb1fbde50c

      • \Windows\system\spoolsv.exe

        Filesize

        6.6MB

        MD5

        d6e5ca24613c718779aa0d0ff2863c3c

        SHA1

        01e17c67075c768235517fe699193c365d4090b8

        SHA256

        7c0a588bfb116a9f712118392e73ac8b7343909041ff085765db8fb1ae5f64ea

        SHA512

        95f6ad65ccacbe8d49f4b877295bf4b25572970d0f6b2145ce1661f032552ab5b7694f2735d01b35240c6880d82debd23a46875be697a1377c2240bf70a67ab7

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        366b8eeb69ba42de414982cc30c2d443

        SHA1

        88a890a6c7fb3dab8951ee3cd6d88febaa5effaf

        SHA256

        c10bc03a7d3742aa381620c2d88cd05a36fdc33608109b9437218096280d29e3

        SHA512

        019d2a43b4a6a2e5f3a62ffda1366342d59a957ef27a2133bb8d214b2537f59a61486a2d2d2a0deba980feed3add45cf45ff1c31be08747a5c9a10ed342b96e4

      • memory/1868-125-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1868-114-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1984-6-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/1984-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1984-3-0x00000000001B0000-0x00000000001B1000-memory.dmp

        Filesize

        4KB

      • memory/1984-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1984-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1984-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1984-40-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2012-145-0x0000000003190000-0x00000000032A4000-memory.dmp

        Filesize

        1.1MB

      • memory/2012-133-0x0000000003190000-0x00000000032A4000-memory.dmp

        Filesize

        1.1MB

      • memory/2012-142-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2012-124-0x0000000003190000-0x00000000032A4000-memory.dmp

        Filesize

        1.1MB

      • memory/2012-122-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2012-146-0x0000000003190000-0x00000000032A4000-memory.dmp

        Filesize

        1.1MB

      • memory/2012-101-0x0000000003190000-0x00000000032A4000-memory.dmp

        Filesize

        1.1MB

      • memory/2012-154-0x0000000003190000-0x00000000032A4000-memory.dmp

        Filesize

        1.1MB

      • memory/2568-173-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2656-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2656-51-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2656-90-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2656-57-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2656-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2656-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2756-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-27-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-21-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-49-0x0000000003400000-0x0000000003514000-memory.dmp

        Filesize

        1.1MB

      • memory/2756-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-56-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2756-14-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2884-36-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2884-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2884-33-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2884-28-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2884-38-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2956-102-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2956-123-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2956-103-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2956-100-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/3012-135-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB