Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 13:10
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOCUMENT.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SHIPPING DOCUMENT.exe
Resource
win10v20201028
General
-
Target
SHIPPING DOCUMENT.exe
-
Size
894KB
-
MD5
df83820db281080e66e57ca20f2b7f45
-
SHA1
eaf95598907bbcfc067ea97529661e849e369600
-
SHA256
1b239419c0f7b8b7fee565928beaaee9c32d0897a1f4948f72a7a5339fd60b31
-
SHA512
092c428ec3aea82ca1c278d334147aedd347713bca6fcfe3f5035a2890031a9159038df36c3ea9812d059530edc7b953326c6c601cd09e8bbf16fc763b10c2fc
Malware Config
Extracted
warzonerat
40.84.216.183:7600
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/756-10-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/756-11-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/756-13-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SHIPPING DOCUMENT.exedescription pid process target process PID 1108 set thread context of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
SHIPPING DOCUMENT.exedescription pid process target process PID 1108 wrote to memory of 1564 1108 SHIPPING DOCUMENT.exe schtasks.exe PID 1108 wrote to memory of 1564 1108 SHIPPING DOCUMENT.exe schtasks.exe PID 1108 wrote to memory of 1564 1108 SHIPPING DOCUMENT.exe schtasks.exe PID 1108 wrote to memory of 1564 1108 SHIPPING DOCUMENT.exe schtasks.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 1108 wrote to memory of 756 1108 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fFIgKSx" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF5B4.tmp"2⤵
- Creates scheduled task(s)
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"2⤵PID:756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
68ba89912c60a2acd52ca4c534e666ab
SHA1135981cfebab83f8afccecbe573994e27b1b351a
SHA256695d4ad1cffe9e06cb2ea4b8cc8c7c43d112f5fcaaef99bfd27d0a65a49e4f94
SHA512e6725382eb62fa0d9f5f3fe234d4210224fffdf4857fda977b6f47f5670a8714c6c89bf20ea8ac6f30719c0761b40a56dbe0b2ed80fb5362137a0ba1bfaccf3c