Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 12:59
Behavioral task
behavioral1
Sample
Estado.de.cuenta.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Estado.de.cuenta.xls
Resource
win10v2004-20241007-en
General
-
Target
Estado.de.cuenta.xls
-
Size
68KB
-
MD5
76cd88a1fcedb634ba92c2dbfe23f347
-
SHA1
c9d4637805cf01662d01468d9c7b4af6779f04e9
-
SHA256
3aafd49e8b45da7b71ac8e6223e86bdccb9f81f979312b66a0c6bf9b28034de1
-
SHA512
a0b81d373efd1844283718ca3999f7b34f5862a84043792660a31d13a1054033b0903d45becfe2a4c46ce1e847c84c6aef7ce32b91029abfac06bf5daf0975b3
-
SSDEEP
1536:LYxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAZXo4inBGp9tRG52yrrFL/+q:LYxEtjPOtioVjDGUU1qfDlaGGx+cL2Q3
Malware Config
Extracted
warzonerat
dns.stipamana.com:5219
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1308-62-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1308-66-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/836-77-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 2124 OXIRP.exe 1308 OXIRP.exe 2312 OXIRP.exe 2760 images.exe 836 images.exe 2300 images.exe -
Loads dropped DLL 5 IoCs
pid Process 2112 EXCEL.EXE 2112 EXCEL.EXE 2112 EXCEL.EXE 2112 EXCEL.EXE 1308 OXIRP.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" OXIRP.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2124 set thread context of 1308 2124 OXIRP.exe 32 PID 2124 set thread context of 2312 2124 OXIRP.exe 33 PID 2760 set thread context of 836 2760 images.exe 36 PID 2760 set thread context of 2300 2760 images.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OXIRP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OXIRP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OXIRP.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2112 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2124 OXIRP.exe Token: SeDebugPrivilege 2760 images.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2112 EXCEL.EXE 2112 EXCEL.EXE 2112 EXCEL.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2124 2112 EXCEL.EXE 31 PID 2112 wrote to memory of 2124 2112 EXCEL.EXE 31 PID 2112 wrote to memory of 2124 2112 EXCEL.EXE 31 PID 2112 wrote to memory of 2124 2112 EXCEL.EXE 31 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 1308 2124 OXIRP.exe 32 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 2124 wrote to memory of 2312 2124 OXIRP.exe 33 PID 1308 wrote to memory of 2760 1308 OXIRP.exe 35 PID 1308 wrote to memory of 2760 1308 OXIRP.exe 35 PID 1308 wrote to memory of 2760 1308 OXIRP.exe 35 PID 1308 wrote to memory of 2760 1308 OXIRP.exe 35 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 836 2760 images.exe 36 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37 PID 2760 wrote to memory of 2300 2760 images.exe 37
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Estado.de.cuenta.xls1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\OXIRP.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\OXIRP.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\OXIRP.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\OXIRP.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\ProgramData\images.exeC:\ProgramData\images.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:836
-
-
C:\ProgramData\images.exeC:\ProgramData\images.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2300
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\OXIRP.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\OXIRP.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD502d76284444642d7f5ae9739f082b580
SHA1a36cbb1ded51e759271534c2ddb6dffcf24fd141
SHA256deb4bdf64f98cdfd122317d023d93b26a4d3168c4296ddf97076484c9a40216e
SHA512c86fcfb0c7e695346b6c4b4b1e2b018f378070d711a536eab5347b67cd863a46a584f022efe8a0a70fa7f10538f7ba80de1a14d301bcc82d901bc082884cb6c8