Analysis
-
max time kernel
128s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-01-2021 18:05
Static task
static1
Behavioral task
behavioral1
Sample
TT.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
TT.exe
Resource
win10v20201028
General
-
Target
TT.exe
-
Size
1.5MB
-
MD5
d074acab7ccb3a5e0991fe9274fdca20
-
SHA1
dff5ce1faa43bfb7ba8fceeba7d044a7eba37e45
-
SHA256
023823859e196b15112c3e59e6247ceef4001f5a36f0e1383aa63b3b5a1c3aa6
-
SHA512
e9a2ed5c89d4230ab5d4613def6e99d41a971e8e4350e9e0e1dc0cf842ea292484f20771b8f8e2278ff5a91b4f9adc59c0585e6c463b2e3a86cabbe16313b576
Malware Config
Extracted
warzonerat
185.222.57.213:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3980-2-0x0000000002650000-0x00000000027A4000-memory.dmp warzonerat behavioral2/memory/1268-6-0x00000000027F0000-0x0000000002944000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 1268 images.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
TT.exeimages.exedescription pid process target process PID 3980 wrote to memory of 1268 3980 TT.exe images.exe PID 3980 wrote to memory of 1268 3980 TT.exe images.exe PID 3980 wrote to memory of 1268 3980 TT.exe images.exe PID 1268 wrote to memory of 3960 1268 images.exe cmd.exe PID 1268 wrote to memory of 3960 1268 images.exe cmd.exe PID 1268 wrote to memory of 3960 1268 images.exe cmd.exe PID 1268 wrote to memory of 3960 1268 images.exe cmd.exe PID 1268 wrote to memory of 3960 1268 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TT.exe"C:\Users\Admin\AppData\Local\Temp\TT.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:3960
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d074acab7ccb3a5e0991fe9274fdca20
SHA1dff5ce1faa43bfb7ba8fceeba7d044a7eba37e45
SHA256023823859e196b15112c3e59e6247ceef4001f5a36f0e1383aa63b3b5a1c3aa6
SHA512e9a2ed5c89d4230ab5d4613def6e99d41a971e8e4350e9e0e1dc0cf842ea292484f20771b8f8e2278ff5a91b4f9adc59c0585e6c463b2e3a86cabbe16313b576
-
MD5
d074acab7ccb3a5e0991fe9274fdca20
SHA1dff5ce1faa43bfb7ba8fceeba7d044a7eba37e45
SHA256023823859e196b15112c3e59e6247ceef4001f5a36f0e1383aa63b3b5a1c3aa6
SHA512e9a2ed5c89d4230ab5d4613def6e99d41a971e8e4350e9e0e1dc0cf842ea292484f20771b8f8e2278ff5a91b4f9adc59c0585e6c463b2e3a86cabbe16313b576