Analysis

  • max time kernel
    118s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 13:27

General

  • Target

    021dd782c1aa99d4a6bd4fd57a843a2fdc7b63820ae41e6157b9baaf7ac3fa36N.exe

  • Size

    8.2MB

  • MD5

    bbad0d0174334cf90ed6d1ba88fbbcd0

  • SHA1

    6c3bc5b3ffd9cbc77a8b253971211a6e68053287

  • SHA256

    021dd782c1aa99d4a6bd4fd57a843a2fdc7b63820ae41e6157b9baaf7ac3fa36

  • SHA512

    d4b923b672f4a4aea10b343a3d42fa33f6a44d3cd850e452a7d78bed716c9ae059c816797845ca0393abf08ca7681c55a664d727088b36832f7907c1a24b08ce

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNec1:V8e8e8f8e8e8+

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\021dd782c1aa99d4a6bd4fd57a843a2fdc7b63820ae41e6157b9baaf7ac3fa36N.exe
    "C:\Users\Admin\AppData\Local\Temp\021dd782c1aa99d4a6bd4fd57a843a2fdc7b63820ae41e6157b9baaf7ac3fa36N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\021dd782c1aa99d4a6bd4fd57a843a2fdc7b63820ae41e6157b9baaf7ac3fa36N.exe
      "C:\Users\Admin\AppData\Local\Temp\021dd782c1aa99d4a6bd4fd57a843a2fdc7b63820ae41e6157b9baaf7ac3fa36N.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2616
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1268
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1012
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2292
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2476
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1380
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2976
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:280
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1964
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2676
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2512
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:3008
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2124
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:316
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1520
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2700
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:2416
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2600

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        8.2MB

        MD5

        bbad0d0174334cf90ed6d1ba88fbbcd0

        SHA1

        6c3bc5b3ffd9cbc77a8b253971211a6e68053287

        SHA256

        021dd782c1aa99d4a6bd4fd57a843a2fdc7b63820ae41e6157b9baaf7ac3fa36

        SHA512

        d4b923b672f4a4aea10b343a3d42fa33f6a44d3cd850e452a7d78bed716c9ae059c816797845ca0393abf08ca7681c55a664d727088b36832f7907c1a24b08ce

      • C:\Windows\system\explorer.exe

        Filesize

        8.2MB

        MD5

        e5479e17ccdd1403f8698e9aa590e48a

        SHA1

        d847ec39f1439e8dc98e33d86e7c6afc71fade2e

        SHA256

        ed95c8a8b6843944057832af8eea61e55cd608b3529928ac9325bf731796f1e6

        SHA512

        7a093fef4186941a2fcfdfad98ea49bb550f075ba2fc893fc35a9854f6d1976ba4426bfa32fa21d5d5d37860c5cce188f6c5ede9a3c4677237b919979f0601a9

      • \Windows\system\spoolsv.exe

        Filesize

        8.2MB

        MD5

        f55d37b4aeba6a55769261bf85b3a73b

        SHA1

        dee4a53008c1bce2691a80190f35417f9aad641d

        SHA256

        e946f87b580ce997c8b4afa41f99f96ba57ccb668b65cd5bbc1e99ab59a2c46c

        SHA512

        dca4d9021dd4f18fcef7f1b8e4e181819223494cf78525ee380485655c777bc177163c2231744eca29212be38b2d754bbae77a84f3517dbc81cefd0ba1c0bb95

      • memory/1012-100-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1012-90-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1012-127-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1012-109-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1012-116-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1012-142-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1012-144-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1012-133-0x0000000003340000-0x0000000003454000-memory.dmp

        Filesize

        1.1MB

      • memory/1268-89-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1268-57-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1268-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1268-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1268-54-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1268-51-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1520-201-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2292-102-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2292-101-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2292-141-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2292-103-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2404-34-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2404-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2404-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2404-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2404-3-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2404-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2404-6-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2404-21-0x0000000001E80000-0x0000000001F94000-memory.dmp

        Filesize

        1.1MB

      • memory/2476-124-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2476-115-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2600-29-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2600-35-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2600-33-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2600-25-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2600-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2616-48-0x0000000003200000-0x0000000003314000-memory.dmp

        Filesize

        1.1MB

      • memory/2616-24-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2616-36-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2616-49-0x0000000003200000-0x0000000003314000-memory.dmp

        Filesize

        1.1MB

      • memory/2616-12-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2616-10-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2616-56-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2616-15-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB