Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 19:03
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOCUMENT.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SHIPPING DOCUMENT.exe
Resource
win10v20201028
General
-
Target
SHIPPING DOCUMENT.exe
-
Size
894KB
-
MD5
df83820db281080e66e57ca20f2b7f45
-
SHA1
eaf95598907bbcfc067ea97529661e849e369600
-
SHA256
1b239419c0f7b8b7fee565928beaaee9c32d0897a1f4948f72a7a5339fd60b31
-
SHA512
092c428ec3aea82ca1c278d334147aedd347713bca6fcfe3f5035a2890031a9159038df36c3ea9812d059530edc7b953326c6c601cd09e8bbf16fc763b10c2fc
Malware Config
Extracted
warzonerat
40.84.216.183:7600
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1280-10-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1280-11-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/1280-13-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SHIPPING DOCUMENT.exedescription pid process target process PID 528 set thread context of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
SHIPPING DOCUMENT.exedescription pid process target process PID 528 wrote to memory of 316 528 SHIPPING DOCUMENT.exe schtasks.exe PID 528 wrote to memory of 316 528 SHIPPING DOCUMENT.exe schtasks.exe PID 528 wrote to memory of 316 528 SHIPPING DOCUMENT.exe schtasks.exe PID 528 wrote to memory of 316 528 SHIPPING DOCUMENT.exe schtasks.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 528 wrote to memory of 1280 528 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fFIgKSx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5264.tmp"2⤵
- Creates scheduled task(s)
PID:316 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"2⤵PID:1280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
45cc971fa1240e57ed2b7ad4f90423b8
SHA1c915ce419f8495ef4729b4211c9f03aad14c762b
SHA2567fdd5feef05e1e5c98493b305dcd1f9ec0db24ce9b1af3489f71c053152dc641
SHA512a0a6ac1176b1772cfe65cb8aefcc06524974867a853a8b48c31bf622de2b000cb04dd8b46d3b1a9b84f5cdc99a8e45584eb90f7f556f4acfa8de523130f28b6c