Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-01-2021 06:59
Static task
static1
Behavioral task
behavioral1
Sample
tuesdacrypted.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
tuesdacrypted.exe
Resource
win10v20201028
General
-
Target
tuesdacrypted.exe
-
Size
1.5MB
-
MD5
3a84b77974a6ec15009a18042c369b11
-
SHA1
e77f891790b4f4f2728cd687c3ffd99d263d0e31
-
SHA256
f74176506b2de80c22ba193508413540b9b13ca4ab364ecba8ae97120adb3ec3
-
SHA512
49cd9bd37a3aa701dc3bc16fa7d311ba57b8519124168f00526fd321ab96d9b2ccde654fad4da5c0c24f57c79884271756d07db6c746273c44dfe9eaa3a22d85
Malware Config
Extracted
warzonerat
185.222.57.68:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1368-2-0x0000000002380000-0x00000000024D4000-memory.dmp warzonerat behavioral1/memory/1668-6-0x0000000002560000-0x00000000026B4000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 1668 images.exe -
Loads dropped DLL 1 IoCs
Processes:
tuesdacrypted.exepid process 1368 tuesdacrypted.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tuesdacrypted.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" tuesdacrypted.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
images.exepid process 1668 images.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
tuesdacrypted.exeimages.exedescription pid process target process PID 1368 wrote to memory of 1668 1368 tuesdacrypted.exe images.exe PID 1368 wrote to memory of 1668 1368 tuesdacrypted.exe images.exe PID 1368 wrote to memory of 1668 1368 tuesdacrypted.exe images.exe PID 1368 wrote to memory of 1668 1368 tuesdacrypted.exe images.exe PID 1668 wrote to memory of 1324 1668 images.exe cmd.exe PID 1668 wrote to memory of 1324 1668 images.exe cmd.exe PID 1668 wrote to memory of 1324 1668 images.exe cmd.exe PID 1668 wrote to memory of 1324 1668 images.exe cmd.exe PID 1668 wrote to memory of 1324 1668 images.exe cmd.exe PID 1668 wrote to memory of 1324 1668 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tuesdacrypted.exe"C:\Users\Admin\AppData\Local\Temp\tuesdacrypted.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeMD5
3a84b77974a6ec15009a18042c369b11
SHA1e77f891790b4f4f2728cd687c3ffd99d263d0e31
SHA256f74176506b2de80c22ba193508413540b9b13ca4ab364ecba8ae97120adb3ec3
SHA51249cd9bd37a3aa701dc3bc16fa7d311ba57b8519124168f00526fd321ab96d9b2ccde654fad4da5c0c24f57c79884271756d07db6c746273c44dfe9eaa3a22d85
-
C:\ProgramData\images.exeMD5
3a84b77974a6ec15009a18042c369b11
SHA1e77f891790b4f4f2728cd687c3ffd99d263d0e31
SHA256f74176506b2de80c22ba193508413540b9b13ca4ab364ecba8ae97120adb3ec3
SHA51249cd9bd37a3aa701dc3bc16fa7d311ba57b8519124168f00526fd321ab96d9b2ccde654fad4da5c0c24f57c79884271756d07db6c746273c44dfe9eaa3a22d85
-
\ProgramData\images.exeMD5
3a84b77974a6ec15009a18042c369b11
SHA1e77f891790b4f4f2728cd687c3ffd99d263d0e31
SHA256f74176506b2de80c22ba193508413540b9b13ca4ab364ecba8ae97120adb3ec3
SHA51249cd9bd37a3aa701dc3bc16fa7d311ba57b8519124168f00526fd321ab96d9b2ccde654fad4da5c0c24f57c79884271756d07db6c746273c44dfe9eaa3a22d85
-
memory/1324-8-0x0000000000000000-mapping.dmp
-
memory/1324-9-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/1324-10-0x0000000000170000-0x0000000000171000-memory.dmpFilesize
4KB
-
memory/1368-2-0x0000000002380000-0x00000000024D4000-memory.dmpFilesize
1.3MB
-
memory/1668-4-0x0000000000000000-mapping.dmp
-
memory/1668-6-0x0000000002560000-0x00000000026B4000-memory.dmpFilesize
1.3MB