Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe
Resource
win10v2004-20250410-en
General
-
Target
2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe
-
Size
1017KB
-
MD5
9759affa4a1a347b190a16750e35a89b
-
SHA1
01f22bd70b58a4e0e7689608e3b91e3af4e9d689
-
SHA256
479e885030fd31f559f3293f9d4d73df551e9248db02766bb82211b0d7a09f40
-
SHA512
a72666f5c015676066fe01dbe42b76bb8ee2e2c591c8af9b8bd4ef7428541a184360c2ed31b8140e83f5abd61e8fdee3aa3e8e37110aa1094a93ab598b72453a
-
SSDEEP
12288:9crNS33L10QdrXi4P7r9r/+ppppppppppppppppppppppppppppp0GHpnm5vltvN:ANA3R5drXj1qHpm5dZGmRG3KZ97Z/
Malware Config
Extracted
warzonerat
bhirtyfive55.ydns.eu:5210
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/memory/3784-30-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/3784-33-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/4848-44-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Control Panel\International\Geo\Nation 2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe Key value queried \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\Control Panel\International\Geo\Nation dtgerbge.sfx.exe -
Executes dropped EXE 10 IoCs
pid Process 2552 dtgerbge.sfx.exe 2976 dtgerbge.exe 1304 dtgerbge.exe 3784 dtgerbge.exe 4448 cdimages.exe 4504 cdimages.exe 4848 cdimages.exe 4932 cdimages.exe 3832 cdimages.exe 536 cdimages.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\cdimages.exe" dtgerbge.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2976 set thread context of 1304 2976 dtgerbge.exe 93 PID 2976 set thread context of 3784 2976 dtgerbge.exe 94 PID 4448 set thread context of 4848 4448 cdimages.exe 104 PID 4448 set thread context of 4932 4448 cdimages.exe 105 PID 4504 set thread context of 3832 4504 cdimages.exe 108 PID 4504 set thread context of 536 4504 cdimages.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3456 1304 WerFault.exe 93 3660 4932 WerFault.exe 105 4712 536 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtgerbge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdimages.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdimages.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdimages.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtgerbge.sfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtgerbge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdimages.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2976 dtgerbge.exe Token: SeDebugPrivilege 4448 cdimages.exe Token: SeDebugPrivilege 4504 cdimages.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1520 wrote to memory of 5048 1520 2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe 87 PID 1520 wrote to memory of 5048 1520 2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe 87 PID 1520 wrote to memory of 5048 1520 2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe 87 PID 5048 wrote to memory of 2552 5048 cmd.exe 91 PID 5048 wrote to memory of 2552 5048 cmd.exe 91 PID 5048 wrote to memory of 2552 5048 cmd.exe 91 PID 2552 wrote to memory of 2976 2552 dtgerbge.sfx.exe 92 PID 2552 wrote to memory of 2976 2552 dtgerbge.sfx.exe 92 PID 2552 wrote to memory of 2976 2552 dtgerbge.sfx.exe 92 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 1304 2976 dtgerbge.exe 93 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 2976 wrote to memory of 3784 2976 dtgerbge.exe 94 PID 3784 wrote to memory of 4448 3784 dtgerbge.exe 101 PID 3784 wrote to memory of 4448 3784 dtgerbge.exe 101 PID 3784 wrote to memory of 4448 3784 dtgerbge.exe 101 PID 3956 wrote to memory of 4504 3956 cmd.exe 103 PID 3956 wrote to memory of 4504 3956 cmd.exe 103 PID 3956 wrote to memory of 4504 3956 cmd.exe 103 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4848 4448 cdimages.exe 104 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4448 wrote to memory of 4932 4448 cdimages.exe 105 PID 4504 wrote to memory of 3832 4504 cdimages.exe 108 PID 4504 wrote to memory of 3832 4504 cdimages.exe 108 PID 4504 wrote to memory of 3832 4504 cdimages.exe 108 PID 4504 wrote to memory of 3832 4504 cdimages.exe 108 PID 4504 wrote to memory of 3832 4504 cdimages.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-15_9759affa4a1a347b190a16750e35a89b_black-basta_elex_luca-stealer_metamorfo.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dthgfxtr.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\dtgerbge.sfx.exedtgerbge.sfx.exe -dC:\Users\Admin\AppData\Local\Temp -pgfsafdyehofxvflfnouioihmyjfodtydzalepdnoinlnafugyfHbgnmeGRhvqxsd3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\dtgerbge.exe"C:\Users\Admin\AppData\Local\Temp\dtgerbge.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\dtgerbge.exeC:\Users\Admin\AppData\Local\Temp\dtgerbge.exe5⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 806⤵
- Program crash
PID:3456
-
-
-
C:\Users\Admin\AppData\Local\Temp\dtgerbge.exeC:\Users\Admin\AppData\Local\Temp\dtgerbge.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\ProgramData\cdimages.exe"C:\ProgramData\cdimages.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\ProgramData\cdimages.exeC:\ProgramData\cdimages.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4848
-
-
C:\ProgramData\cdimages.exeC:\ProgramData\cdimages.exe7⤵
- Executes dropped EXE
PID:4932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 808⤵
- Program crash
PID:3660
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1304 -ip 13041⤵PID:2460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\cdimages.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\ProgramData\cdimages.exeC:\ProgramData\cdimages.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\ProgramData\cdimages.exeC:\ProgramData\cdimages.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3832
-
-
C:\ProgramData\cdimages.exeC:\ProgramData\cdimages.exe3⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 804⤵
- Program crash
PID:4712
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4932 -ip 49321⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 536 -ip 5361⤵PID:3656
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
342KB
MD5830adba8e468bb608837e9ccbedf77a6
SHA19e7d210f2df26e63e029d49e2bfb688bc9d67184
SHA256bff438da0fb193e1d30fd83fe25a349a24106b6f76aa74b531aecca06990ff33
SHA512938d5fc74e62c16fd5fafdd3931dd0b50acdd4122d78d84e71d3cdae959a2b71f9404cd69963db5e48000e4d9242b7d7a230bb18ec8a175268279f8e501876cb
-
Filesize
667KB
MD5794dce1590947eaffdebe8979fc2e3a1
SHA150c8b50d3a82e516d4fca0ee73d23219b5bfafdc
SHA2563e99a24d2f323da5edaad6f8cfb2375e43839ca1b44c5ab33b67f37ee61ca100
SHA512f63b6110cc48065168e9dc963084a48b55024f4582cd596c3b81831e3626f272989c315bf653013004dceb9a1970db81d44ea033361172979c0ddeebbc3d333b
-
Filesize
35KB
MD5c2af6c0dada93a8fa724b8e808e35d14
SHA1684ba947ca8e8e290d93481a9aa5ccb9fd4d1065
SHA256610a3b4150d2d70d0266f0933fbd794acbda02bc364fe5b416ff603db9acaba6
SHA512c0e9f4b3b532695445512f760eafa5505c0d9dee00ab688cbbbc18f5d8477b5cf9ab0490a3c088b5fc23a6e29591426421b4b01302a2dd7e26b1c7ef1e59b6d6