Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe
Resource
win10v2004-20250314-en
General
-
Target
b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe
-
Size
312KB
-
MD5
2496c32182f058193c695bf5a21d6ced
-
SHA1
8c4cd680dcfcd6a798d035351c26217098b5f9fd
-
SHA256
b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31
-
SHA512
098f5866a222a71239886afcbcfa092d69bc04bfd33eb0a55d8a64b574dbb7296fcfae61d680285bb19b5f16a29b7c0efe99496658e2cde7937ec8822e5c49a0
-
SSDEEP
6144:Kp5mfHHx9QFeYj/jzT+Nbbeoq2aIcEo/hLrBRfQ+8sCVKZubm8J9R7x6uQoErG:OqnxqEYj/fkaoq2aIcEwhL9Rr8sCVGG3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\qMh3ao2yIbA47mag\\PkFoH3dbn41S.exe\" \"C:\\Users\\Admin\\AppData\\Roaming\\qMh3ao2yIbA47mag\\J1CbyWmz4kqz.exe\",explorer.exe" images.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\qMh3ao2yIbA47mag\\J1CbyWmz4kqz.exe\",explorer.exe" b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe -
Executes dropped EXE 1 IoCs
pid Process 2228 images.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language images.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\ProgramData:ApplicationData b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2100 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe Token: SeDebugPrivilege 2100 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe Token: SeDebugPrivilege 2228 images.exe Token: SeDebugPrivilege 2228 images.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe Token: SeShutdownPrivilege 2744 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe 2744 explorer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2228 2100 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe 31 PID 2100 wrote to memory of 2228 2100 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe 31 PID 2100 wrote to memory of 2228 2100 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe 31 PID 2100 wrote to memory of 2228 2100 b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe 31 PID 2228 wrote to memory of 532 2228 images.exe 34 PID 2228 wrote to memory of 532 2228 images.exe 34 PID 2228 wrote to memory of 532 2228 images.exe 34 PID 2228 wrote to memory of 532 2228 images.exe 34 PID 2228 wrote to memory of 532 2228 images.exe 34 PID 2228 wrote to memory of 532 2228 images.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe"C:\Users\Admin\AppData\Local\Temp\b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:532
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD52496c32182f058193c695bf5a21d6ced
SHA18c4cd680dcfcd6a798d035351c26217098b5f9fd
SHA256b1b3a3b2ff01c33585d2fa3eadd78741af5b421e7463450e348401be175f0a31
SHA512098f5866a222a71239886afcbcfa092d69bc04bfd33eb0a55d8a64b574dbb7296fcfae61d680285bb19b5f16a29b7c0efe99496658e2cde7937ec8822e5c49a0