Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe
-
Size
1017KB
-
MD5
9759affa4a1a347b190a16750e35a89b
-
SHA1
01f22bd70b58a4e0e7689608e3b91e3af4e9d689
-
SHA256
479e885030fd31f559f3293f9d4d73df551e9248db02766bb82211b0d7a09f40
-
SHA512
a72666f5c015676066fe01dbe42b76bb8ee2e2c591c8af9b8bd4ef7428541a184360c2ed31b8140e83f5abd61e8fdee3aa3e8e37110aa1094a93ab598b72453a
-
SSDEEP
12288:9crNS33L10QdrXi4P7r9r/+ppppppppppppppppppppppppppppp0GHpnm5vltvN:ANA3R5drXj1qHpm5dZGmRG3KZ97Z/
Malware Config
Extracted
warzonerat
bhirtyfive55.ydns.eu:5210
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/memory/4840-33-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/4764-28-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/3348-50-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation dtgerbge.sfx.exe -
Executes dropped EXE 10 IoCs
pid Process 5636 dtgerbge.sfx.exe 4828 dtgerbge.exe 4764 dtgerbge.exe 4840 dtgerbge.exe 2688 cdimages.exe 1508 cdimages.exe 1232 cdimages.exe 3348 cdimages.exe 5272 cdimages.exe 5336 cdimages.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\cdimages.exe" dtgerbge.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4828 set thread context of 4764 4828 dtgerbge.exe 94 PID 4828 set thread context of 4840 4828 dtgerbge.exe 95 PID 2688 set thread context of 3348 2688 cdimages.exe 102 PID 2688 set thread context of 1232 2688 cdimages.exe 103 PID 1508 set thread context of 5272 1508 cdimages.exe 104 PID 1508 set thread context of 5336 1508 cdimages.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 932 5272 WerFault.exe 104 380 5336 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtgerbge.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtgerbge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtgerbge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdimages.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdimages.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdimages.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtgerbge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdimages.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4828 dtgerbge.exe Token: SeDebugPrivilege 2688 cdimages.exe Token: SeDebugPrivilege 1508 cdimages.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5756 wrote to memory of 2796 5756 2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe 87 PID 5756 wrote to memory of 2796 5756 2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe 87 PID 5756 wrote to memory of 2796 5756 2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe 87 PID 2796 wrote to memory of 5636 2796 cmd.exe 91 PID 2796 wrote to memory of 5636 2796 cmd.exe 91 PID 2796 wrote to memory of 5636 2796 cmd.exe 91 PID 5636 wrote to memory of 4828 5636 dtgerbge.sfx.exe 93 PID 5636 wrote to memory of 4828 5636 dtgerbge.sfx.exe 93 PID 5636 wrote to memory of 4828 5636 dtgerbge.sfx.exe 93 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4764 4828 dtgerbge.exe 94 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4828 wrote to memory of 4840 4828 dtgerbge.exe 95 PID 4840 wrote to memory of 2688 4840 dtgerbge.exe 99 PID 4840 wrote to memory of 2688 4840 dtgerbge.exe 99 PID 4840 wrote to memory of 2688 4840 dtgerbge.exe 99 PID 856 wrote to memory of 1508 856 cmd.exe 101 PID 856 wrote to memory of 1508 856 cmd.exe 101 PID 856 wrote to memory of 1508 856 cmd.exe 101 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 3348 2688 cdimages.exe 102 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 2688 wrote to memory of 1232 2688 cdimages.exe 103 PID 1508 wrote to memory of 5272 1508 cdimages.exe 104 PID 1508 wrote to memory of 5272 1508 cdimages.exe 104 PID 1508 wrote to memory of 5272 1508 cdimages.exe 104 PID 1508 wrote to memory of 5272 1508 cdimages.exe 104 PID 1508 wrote to memory of 5272 1508 cdimages.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dthgfxtr.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\dtgerbge.sfx.exedtgerbge.sfx.exe -dC:\Users\Admin\AppData\Local\Temp -pgfsafdyehofxvflfnouioihmyjfodtydzalepdnoinlnafugyfHbgnmeGRhvqxsd3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5636 -
C:\Users\Admin\AppData\Local\Temp\dtgerbge.exe"C:\Users\Admin\AppData\Local\Temp\dtgerbge.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\dtgerbge.exeC:\Users\Admin\AppData\Local\Temp\dtgerbge.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\dtgerbge.exeC:\Users\Admin\AppData\Local\Temp\dtgerbge.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\ProgramData\cdimages.exe"C:\ProgramData\cdimages.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\ProgramData\cdimages.exeC:\ProgramData\cdimages.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3348
-
-
C:\ProgramData\cdimages.exeC:\ProgramData\cdimages.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1232
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\cdimages.exe1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\ProgramData\cdimages.exeC:\ProgramData\cdimages.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\ProgramData\cdimages.exeC:\ProgramData\cdimages.exe3⤵
- Executes dropped EXE
PID:5272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5272 -s 804⤵
- Program crash
PID:932
-
-
-
C:\ProgramData\cdimages.exeC:\ProgramData\cdimages.exe3⤵
- Executes dropped EXE
PID:5336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5336 -s 804⤵
- Program crash
PID:380
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5336 -ip 53361⤵PID:1208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5272 -ip 52721⤵PID:1256
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
342KB
MD5830adba8e468bb608837e9ccbedf77a6
SHA19e7d210f2df26e63e029d49e2bfb688bc9d67184
SHA256bff438da0fb193e1d30fd83fe25a349a24106b6f76aa74b531aecca06990ff33
SHA512938d5fc74e62c16fd5fafdd3931dd0b50acdd4122d78d84e71d3cdae959a2b71f9404cd69963db5e48000e4d9242b7d7a230bb18ec8a175268279f8e501876cb
-
Filesize
667KB
MD5794dce1590947eaffdebe8979fc2e3a1
SHA150c8b50d3a82e516d4fca0ee73d23219b5bfafdc
SHA2563e99a24d2f323da5edaad6f8cfb2375e43839ca1b44c5ab33b67f37ee61ca100
SHA512f63b6110cc48065168e9dc963084a48b55024f4582cd596c3b81831e3626f272989c315bf653013004dceb9a1970db81d44ea033361172979c0ddeebbc3d333b
-
Filesize
35KB
MD5c2af6c0dada93a8fa724b8e808e35d14
SHA1684ba947ca8e8e290d93481a9aa5ccb9fd4d1065
SHA256610a3b4150d2d70d0266f0933fbd794acbda02bc364fe5b416ff603db9acaba6
SHA512c0e9f4b3b532695445512f760eafa5505c0d9dee00ab688cbbbc18f5d8477b5cf9ab0490a3c088b5fc23a6e29591426421b4b01302a2dd7e26b1c7ef1e59b6d6