Analysis

  • max time kernel
    63s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 11:29

General

  • Target

    20210007 Purchase Order.exe

  • Size

    866KB

  • MD5

    2cb1e8b8664b60243ae9d779d722f15b

  • SHA1

    68189a8354d045a0dc176e8580fe0974a393cdb7

  • SHA256

    de752497070302674c9ff806fc9c905d9ca2db93d8d6241d4849da79394fe172

  • SHA512

    0790c9577f4b19280e3f3ee6eb4f397b4cc368c9bf82b8364760939c0dfcfd53b7aa7cb3beb3b469f6fde87a235e858c3f8cffa46d0c035a5697ad5a2a4c27b7

Malware Config

Extracted

Family

warzonerat

C2

52.146.42.226:5600

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20210007 Purchase Order.exe
    "C:\Users\Admin\AppData\Local\Temp\20210007 Purchase Order.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ugmYjfognWv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp23A6.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3324
    • C:\Users\Admin\AppData\Local\Temp\20210007 Purchase Order.exe
      "C:\Users\Admin\AppData\Local\Temp\20210007 Purchase Order.exe"
      2⤵
        PID:1124

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp23A6.tmp

      MD5

      fdd584edb77586eb7e407cbd6da00766

      SHA1

      7ec3ebafeeabf92b1ccff57f85e7045d571d7154

      SHA256

      95ed4d5f4ed0989879900833c5d06ec07a27a41dc8161b16dc2cb42940593b6a

      SHA512

      96bdebdfb1be41a957986ce67e484e122575ff4533595f9c3f9d45b9e89ab2c7e7c391de1bbfbbece670034ce2f43ceaa0471ecfb184e3a54d4c8a2285684830

    • memory/1124-17-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1124-16-0x0000000000405CE2-mapping.dmp

    • memory/1124-15-0x0000000000400000-0x0000000000554000-memory.dmp

      Filesize

      1.3MB

    • memory/1160-9-0x00000000059D0000-0x00000000059D1000-memory.dmp

      Filesize

      4KB

    • memory/1160-8-0x00000000056E0000-0x00000000056E1000-memory.dmp

      Filesize

      4KB

    • memory/1160-2-0x0000000073BE0000-0x00000000742CE000-memory.dmp

      Filesize

      6.9MB

    • memory/1160-10-0x00000000056D0000-0x00000000056D1000-memory.dmp

      Filesize

      4KB

    • memory/1160-11-0x0000000005A30000-0x0000000005A53000-memory.dmp

      Filesize

      140KB

    • memory/1160-12-0x0000000006460000-0x00000000064B5000-memory.dmp

      Filesize

      340KB

    • memory/1160-7-0x0000000005850000-0x0000000005851000-memory.dmp

      Filesize

      4KB

    • memory/1160-6-0x0000000005CB0000-0x0000000005CB1000-memory.dmp

      Filesize

      4KB

    • memory/1160-5-0x00000000056F0000-0x00000000056F1000-memory.dmp

      Filesize

      4KB

    • memory/1160-3-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

      Filesize

      4KB

    • memory/3324-13-0x0000000000000000-mapping.dmp