Analysis
-
max time kernel
63s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 11:29
Static task
static1
Behavioral task
behavioral1
Sample
20210007 Purchase Order.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
20210007 Purchase Order.exe
Resource
win10v20201028
General
-
Target
20210007 Purchase Order.exe
-
Size
866KB
-
MD5
2cb1e8b8664b60243ae9d779d722f15b
-
SHA1
68189a8354d045a0dc176e8580fe0974a393cdb7
-
SHA256
de752497070302674c9ff806fc9c905d9ca2db93d8d6241d4849da79394fe172
-
SHA512
0790c9577f4b19280e3f3ee6eb4f397b4cc368c9bf82b8364760939c0dfcfd53b7aa7cb3beb3b469f6fde87a235e858c3f8cffa46d0c035a5697ad5a2a4c27b7
Malware Config
Extracted
warzonerat
52.146.42.226:5600
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1124-15-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1124-16-0x0000000000405CE2-mapping.dmp warzonerat behavioral2/memory/1124-17-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
20210007 Purchase Order.exedescription pid process target process PID 1160 set thread context of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
20210007 Purchase Order.exedescription pid process target process PID 1160 wrote to memory of 3324 1160 20210007 Purchase Order.exe schtasks.exe PID 1160 wrote to memory of 3324 1160 20210007 Purchase Order.exe schtasks.exe PID 1160 wrote to memory of 3324 1160 20210007 Purchase Order.exe schtasks.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe PID 1160 wrote to memory of 1124 1160 20210007 Purchase Order.exe 20210007 Purchase Order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20210007 Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\20210007 Purchase Order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ugmYjfognWv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp23A6.tmp"2⤵
- Creates scheduled task(s)
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\20210007 Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\20210007 Purchase Order.exe"2⤵PID:1124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
fdd584edb77586eb7e407cbd6da00766
SHA17ec3ebafeeabf92b1ccff57f85e7045d571d7154
SHA25695ed4d5f4ed0989879900833c5d06ec07a27a41dc8161b16dc2cb42940593b6a
SHA51296bdebdfb1be41a957986ce67e484e122575ff4533595f9c3f9d45b9e89ab2c7e7c391de1bbfbbece670034ce2f43ceaa0471ecfb184e3a54d4c8a2285684830