Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 20:34
Behavioral task
behavioral1
Sample
Estado.de.cuenta.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Estado.de.cuenta.xls
Resource
win10v2004-20241007-en
General
-
Target
Estado.de.cuenta.xls
-
Size
67KB
-
MD5
0e3fccb0710d5f645343f0e2085921f2
-
SHA1
e9122949ab988638db6d8c0af8817b6ea9aa32a3
-
SHA256
fcc55ce7ed8adcf68a39bcd131de11e4be7b55899f35614fc67b4ce6ae0d6c0f
-
SHA512
70bfff4861e49b25fb7cc9eac296d70a84c6fee9f30091efeb4c5ae364d34fd9ce034b4e15d96013093c9fb3eadc1f850d73e9df63749e3ba6df57e8d853d6db
-
SSDEEP
1536:bKxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAzXo4inBGp9tRG52yrTQhBlKjq0LOTbl:bKxEtjPOtioVjDGUU1qfDlaGGx+cL2QE
Malware Config
Extracted
warzonerat
dns.stipamana.com:5220
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral2/memory/704-93-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/704-96-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/5104-105-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 1144 VPZVQXDUT.exe 4148 VPZVQXDUT.exe 704 VPZVQXDUT.exe 2428 msimages.exe 5104 msimages.exe 1416 msimages.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msimages = "C:\\ProgramData\\msimages.exe" VPZVQXDUT.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1144 set thread context of 4148 1144 VPZVQXDUT.exe 88 PID 1144 set thread context of 704 1144 VPZVQXDUT.exe 89 PID 2428 set thread context of 5104 2428 msimages.exe 94 PID 2428 set thread context of 1416 2428 msimages.exe 95 -
Program crash 1 IoCs
pid pid_target Process procid_target 1584 4148 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msimages.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPZVQXDUT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VPZVQXDUT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msimages.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msimages.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4176 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1144 VPZVQXDUT.exe Token: SeDebugPrivilege 2428 msimages.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE 4176 EXCEL.EXE -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 4176 wrote to memory of 1144 4176 EXCEL.EXE 86 PID 4176 wrote to memory of 1144 4176 EXCEL.EXE 86 PID 4176 wrote to memory of 1144 4176 EXCEL.EXE 86 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 4148 1144 VPZVQXDUT.exe 88 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 1144 wrote to memory of 704 1144 VPZVQXDUT.exe 89 PID 704 wrote to memory of 2428 704 VPZVQXDUT.exe 93 PID 704 wrote to memory of 2428 704 VPZVQXDUT.exe 93 PID 704 wrote to memory of 2428 704 VPZVQXDUT.exe 93 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 5104 2428 msimages.exe 94 PID 2428 wrote to memory of 1416 2428 msimages.exe 95 PID 2428 wrote to memory of 1416 2428 msimages.exe 95 PID 2428 wrote to memory of 1416 2428 msimages.exe 95 PID 2428 wrote to memory of 1416 2428 msimages.exe 95 PID 2428 wrote to memory of 1416 2428 msimages.exe 95 PID 2428 wrote to memory of 1416 2428 msimages.exe 95 PID 2428 wrote to memory of 1416 2428 msimages.exe 95 PID 2428 wrote to memory of 1416 2428 msimages.exe 95 PID 2428 wrote to memory of 1416 2428 msimages.exe 95 PID 2428 wrote to memory of 1416 2428 msimages.exe 95 PID 2428 wrote to memory of 1416 2428 msimages.exe 95
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Estado.de.cuenta.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\VPZVQXDUT.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\VPZVQXDUT.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\VPZVQXDUT.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\VPZVQXDUT.exe3⤵
- Executes dropped EXE
PID:4148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 804⤵
- Program crash
PID:1584
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\VPZVQXDUT.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\VPZVQXDUT.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:704 -
C:\ProgramData\msimages.exe"C:\ProgramData\msimages.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\ProgramData\msimages.exeC:\ProgramData\msimages.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5104
-
-
C:\ProgramData\msimages.exeC:\ProgramData\msimages.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1416
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4148 -ip 41481⤵PID:4400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5db089cf2f249d5669cfd5ea9253252b1
SHA1368444112437a9ff97038e7386d066cd15eccc89
SHA25609357b2687331ec0b5a4df55dc0e8870ec5ef55c63c50f9681dfa6cde5f3053b
SHA512853163d43d2c64e533732b43dd96b0f342b5617c7d9095815c48b1680a793479ebd50d672121a63c3f4d2610273caa8249a2d134818c64e7008ae81f652d54bb
-
Filesize
277KB
MD507472f63bdec0c4a83767d19b8b7ba19
SHA132392707ddac27ef3cb0baa8365ba11d326e86ce
SHA256044ff15e8d3c9534c11c3719bd88a8302611c697ae888b23c768cec52f1970b6
SHA512259dc8f8303b6be1fde58f090d2f628c80f9cab83be4df93b0b272e3073658cf9504acab7795df0727d900a025d9c2e5d1e7801a2f14c571f04e8b10a26f01ab