Analysis
-
max time kernel
119s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 03:05
Behavioral task
behavioral1
Sample
22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe
Resource
win10v2004-20241007-en
General
-
Target
22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe
-
Size
8.2MB
-
MD5
5b38b3b2a571a945db7ef36cedf360a0
-
SHA1
d8c31282b5842d0a4c8c4842c70690e52a79b700
-
SHA256
22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edc
-
SHA512
7f053766692102ab9aa74e5daa2253649b4abdf407702bb9685f4c0d4dfb324d90a4d687578d4e264be502c894e3f91a80a2e7087dda453ff1a29166bdebf57f
-
SSDEEP
49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecH:V8e8e8f8e8e8Y
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x0008000000018fdf-42.dat warzonerat behavioral1/files/0x0008000000018be7-79.dat warzonerat behavioral1/files/0x0008000000019056-93.dat warzonerat behavioral1/files/0x0008000000019056-184.dat warzonerat behavioral1/files/0x0008000000019056-186.dat warzonerat behavioral1/files/0x0008000000019056-190.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
resource yara_rule behavioral1/files/0x0008000000018fdf-42.dat aspack_v212_v242 behavioral1/files/0x0008000000018be7-79.dat aspack_v212_v242 behavioral1/files/0x0008000000019056-93.dat aspack_v212_v242 behavioral1/files/0x0008000000019056-184.dat aspack_v212_v242 behavioral1/files/0x0008000000019056-186.dat aspack_v212_v242 behavioral1/files/0x0008000000019056-190.dat aspack_v212_v242 -
Executes dropped EXE 8 IoCs
pid Process 2656 explorer.exe 2012 explorer.exe 2956 spoolsv.exe 1868 spoolsv.exe 3012 spoolsv.exe 2288 spoolsv.exe 2568 spoolsv.exe 1300 spoolsv.exe -
Loads dropped DLL 42 IoCs
pid Process 2756 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 2756 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2280 WerFault.exe 2280 WerFault.exe 2280 WerFault.exe 2280 WerFault.exe 2280 WerFault.exe 2280 WerFault.exe 2280 WerFault.exe 2012 explorer.exe 2012 explorer.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 2012 explorer.exe 2012 explorer.exe 280 WerFault.exe 280 WerFault.exe 280 WerFault.exe 280 WerFault.exe 280 WerFault.exe 280 WerFault.exe 280 WerFault.exe 2012 explorer.exe 2012 explorer.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 1700 WerFault.exe 2012 explorer.exe 2012 explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1984 set thread context of 2756 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 31 PID 1984 set thread context of 2884 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 32 PID 2656 set thread context of 2012 2656 explorer.exe 34 PID 2656 set thread context of 2920 2656 explorer.exe 35 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2280 1868 WerFault.exe 37 1940 3012 WerFault.exe 39 280 2288 WerFault.exe 41 1700 2568 WerFault.exe 43 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2756 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 2756 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe 2012 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2756 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 31 PID 1984 wrote to memory of 2756 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 31 PID 1984 wrote to memory of 2756 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 31 PID 1984 wrote to memory of 2756 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 31 PID 1984 wrote to memory of 2756 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 31 PID 1984 wrote to memory of 2756 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 31 PID 1984 wrote to memory of 2756 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 31 PID 1984 wrote to memory of 2756 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 31 PID 1984 wrote to memory of 2756 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 31 PID 1984 wrote to memory of 2884 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 32 PID 1984 wrote to memory of 2884 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 32 PID 1984 wrote to memory of 2884 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 32 PID 1984 wrote to memory of 2884 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 32 PID 1984 wrote to memory of 2884 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 32 PID 1984 wrote to memory of 2884 1984 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 32 PID 2756 wrote to memory of 2656 2756 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 33 PID 2756 wrote to memory of 2656 2756 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 33 PID 2756 wrote to memory of 2656 2756 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 33 PID 2756 wrote to memory of 2656 2756 22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe 33 PID 2656 wrote to memory of 2012 2656 explorer.exe 34 PID 2656 wrote to memory of 2012 2656 explorer.exe 34 PID 2656 wrote to memory of 2012 2656 explorer.exe 34 PID 2656 wrote to memory of 2012 2656 explorer.exe 34 PID 2656 wrote to memory of 2012 2656 explorer.exe 34 PID 2656 wrote to memory of 2012 2656 explorer.exe 34 PID 2656 wrote to memory of 2012 2656 explorer.exe 34 PID 2656 wrote to memory of 2012 2656 explorer.exe 34 PID 2656 wrote to memory of 2012 2656 explorer.exe 34 PID 2656 wrote to memory of 2920 2656 explorer.exe 35 PID 2656 wrote to memory of 2920 2656 explorer.exe 35 PID 2656 wrote to memory of 2920 2656 explorer.exe 35 PID 2656 wrote to memory of 2920 2656 explorer.exe 35 PID 2656 wrote to memory of 2920 2656 explorer.exe 35 PID 2656 wrote to memory of 2920 2656 explorer.exe 35 PID 2012 wrote to memory of 2956 2012 explorer.exe 36 PID 2012 wrote to memory of 2956 2012 explorer.exe 36 PID 2012 wrote to memory of 2956 2012 explorer.exe 36 PID 2012 wrote to memory of 2956 2012 explorer.exe 36 PID 2012 wrote to memory of 1868 2012 explorer.exe 37 PID 2012 wrote to memory of 1868 2012 explorer.exe 37 PID 2012 wrote to memory of 1868 2012 explorer.exe 37 PID 2012 wrote to memory of 1868 2012 explorer.exe 37 PID 1868 wrote to memory of 2280 1868 spoolsv.exe 38 PID 1868 wrote to memory of 2280 1868 spoolsv.exe 38 PID 1868 wrote to memory of 2280 1868 spoolsv.exe 38 PID 1868 wrote to memory of 2280 1868 spoolsv.exe 38 PID 2012 wrote to memory of 3012 2012 explorer.exe 39 PID 2012 wrote to memory of 3012 2012 explorer.exe 39 PID 2012 wrote to memory of 3012 2012 explorer.exe 39 PID 2012 wrote to memory of 3012 2012 explorer.exe 39 PID 3012 wrote to memory of 1940 3012 spoolsv.exe 40 PID 3012 wrote to memory of 1940 3012 spoolsv.exe 40 PID 3012 wrote to memory of 1940 3012 spoolsv.exe 40 PID 3012 wrote to memory of 1940 3012 spoolsv.exe 40 PID 2012 wrote to memory of 2288 2012 explorer.exe 41 PID 2012 wrote to memory of 2288 2012 explorer.exe 41 PID 2012 wrote to memory of 2288 2012 explorer.exe 41 PID 2012 wrote to memory of 2288 2012 explorer.exe 41 PID 2288 wrote to memory of 280 2288 spoolsv.exe 42 PID 2288 wrote to memory of 280 2288 spoolsv.exe 42 PID 2288 wrote to memory of 280 2288 spoolsv.exe 42 PID 2288 wrote to memory of 280 2288 spoolsv.exe 42 PID 2012 wrote to memory of 2568 2012 explorer.exe 43 PID 2012 wrote to memory of 2568 2012 explorer.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe"C:\Users\Admin\AppData\Local\Temp\22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe"C:\Users\Admin\AppData\Local\Temp\22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 366⤵
- Loads dropped DLL
- Program crash
PID:2280
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1940
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 366⤵
- Loads dropped DLL
- Program crash
PID:280
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 366⤵
- Loads dropped DLL
- Program crash
PID:1700
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
PID:1300
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵PID:2920
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD55b38b3b2a571a945db7ef36cedf360a0
SHA1d8c31282b5842d0a4c8c4842c70690e52a79b700
SHA25622d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edc
SHA5127f053766692102ab9aa74e5daa2253649b4abdf407702bb9685f4c0d4dfb324d90a4d687578d4e264be502c894e3f91a80a2e7087dda453ff1a29166bdebf57f
-
Filesize
8.2MB
MD5340318afe698c39488b5b93f20d3de15
SHA1783bd26f410a5016d49bc38d815d892a9e46bc6c
SHA256e2e1a22b6a7459229811bdfb70f9459b5d28110b46305596170abe56d42229b9
SHA512ebb49c31d4dae37992b6303f87ae138256265f0c27f1b3275109b6d74514a09b1093130b32799518a6b65d7c6025380df004229b0f57fcf826cb68e790e4976e
-
Filesize
6.6MB
MD519bdaeea53223940b8a7113651d9d9de
SHA15217069a7c64d6bb855300c3bb1c6541b089694e
SHA256393a2e914a976d918689586e4ba4bcc52188da4e62e388c63b90ec7d29f3aaab
SHA5127a5384206b3c42b5075cf96f019bac833481ff3f455f9ef2392c60dae05f3018c1b30db2d1b44bacf1030cfc23eaecfa87fcf3f6b92841a66d6ee3eebd022d63
-
Filesize
7.2MB
MD54012d263ef92c5881d0abfc3f06a86bd
SHA12410c2111a88f446bb6cf3cfd48bd22493c08f43
SHA2566094e882d5ca77381ffa35892856126aee9dc5b34e7a0ea0a4c65ffde0dcecbb
SHA5124eda592db187265c64eb44f9b3c660781ee142d2f735a5b35b7a4d5713a68fb1cf91a2dc527bbdb17b33935038eb11c0008703b3e454b7986424f4cb1fbde50c
-
Filesize
6.6MB
MD5d6e5ca24613c718779aa0d0ff2863c3c
SHA101e17c67075c768235517fe699193c365d4090b8
SHA2567c0a588bfb116a9f712118392e73ac8b7343909041ff085765db8fb1ae5f64ea
SHA51295f6ad65ccacbe8d49f4b877295bf4b25572970d0f6b2145ce1661f032552ab5b7694f2735d01b35240c6880d82debd23a46875be697a1377c2240bf70a67ab7
-
Filesize
8.2MB
MD5366b8eeb69ba42de414982cc30c2d443
SHA188a890a6c7fb3dab8951ee3cd6d88febaa5effaf
SHA256c10bc03a7d3742aa381620c2d88cd05a36fdc33608109b9437218096280d29e3
SHA512019d2a43b4a6a2e5f3a62ffda1366342d59a957ef27a2133bb8d214b2537f59a61486a2d2d2a0deba980feed3add45cf45ff1c31be08747a5c9a10ed342b96e4