Analysis
-
max time kernel
54s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 19:03
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOCUMENT.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SHIPPING DOCUMENT.exe
Resource
win10v20201028
General
-
Target
SHIPPING DOCUMENT.exe
-
Size
894KB
-
MD5
df83820db281080e66e57ca20f2b7f45
-
SHA1
eaf95598907bbcfc067ea97529661e849e369600
-
SHA256
1b239419c0f7b8b7fee565928beaaee9c32d0897a1f4948f72a7a5339fd60b31
-
SHA512
092c428ec3aea82ca1c278d334147aedd347713bca6fcfe3f5035a2890031a9159038df36c3ea9812d059530edc7b953326c6c601cd09e8bbf16fc763b10c2fc
Malware Config
Extracted
warzonerat
40.84.216.183:7600
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2116-15-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/2116-16-0x0000000000405CE2-mapping.dmp warzonerat behavioral2/memory/2116-17-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SHIPPING DOCUMENT.exedescription pid process target process PID 756 set thread context of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
SHIPPING DOCUMENT.exedescription pid process target process PID 756 wrote to memory of 1560 756 SHIPPING DOCUMENT.exe schtasks.exe PID 756 wrote to memory of 1560 756 SHIPPING DOCUMENT.exe schtasks.exe PID 756 wrote to memory of 1560 756 SHIPPING DOCUMENT.exe schtasks.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe PID 756 wrote to memory of 2116 756 SHIPPING DOCUMENT.exe SHIPPING DOCUMENT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fFIgKSx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6A8.tmp"2⤵
- Creates scheduled task(s)
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING DOCUMENT.exe"2⤵PID:2116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
223ad717602fd75e885310ed68425556
SHA1b07332399193b0085ff1f0984048dba4a1570c97
SHA2561dee6bedbb583c7cbcdf9b01c362a35edd47dd26f6a354a07f105273cbcb96ec
SHA512251651680805ca5c894d4cddb1cea79d19a1d8736c8d68635c4842b1eaa447de2d344d1934a213c386efaf5d193f2ed30aa1bc943d1ad12dd2703d3a2c89b6f9