Analysis
-
max time kernel
36s -
max time network
35s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-04-2021 16:52
Static task
static1
Behavioral task
behavioral1
Sample
RFQ#8086A_461A_0000086_300_3550_2021.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
RFQ#8086A_461A_0000086_300_3550_2021.exe
Resource
win10v20201028
General
-
Target
RFQ#8086A_461A_0000086_300_3550_2021.exe
-
Size
983KB
-
MD5
da76723b187edc1913d3151d6ba0dd78
-
SHA1
57b7bd782126186cb0cd40919a5a88e2283b978b
-
SHA256
1ec80487df001c0f6d41a90bbe2451242977a6f36a276d6eefa8aef0f593ab6b
-
SHA512
e76d2500f8381e135e7b1c4b47ae2360ded8135f4092b121d9f347127ffa9ed550979e0e532b726f0d3811e23e019b0f8fb3788c38ea2e36ca637cbc96819d2a
Malware Config
Extracted
warzonerat
xchilogs.duckdns.org:23411
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/704-17-0x0000000000890000-0x00000000009E4000-memory.dmp warzonerat -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RFQ#8086A_461A_0000086_300_3550_2021.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Obyeke = "C:\\Users\\Public\\Libraries\\ekeybO.url" RFQ#8086A_461A_0000086_300_3550_2021.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
RFQ#8086A_461A_0000086_300_3550_2021.exedescription pid process target process PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe PID 2004 wrote to memory of 704 2004 RFQ#8086A_461A_0000086_300_3550_2021.exe ieinstal.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ#8086A_461A_0000086_300_3550_2021.exe"C:\Users\Admin\AppData\Local\Temp\RFQ#8086A_461A_0000086_300_3550_2021.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/704-6-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/704-7-0x0000000000000000-mapping.dmp
-
memory/704-8-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/704-10-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/704-16-0x0000000010670000-0x00000000107C6000-memory.dmpFilesize
1.3MB
-
memory/704-17-0x0000000000890000-0x00000000009E4000-memory.dmpFilesize
1.3MB
-
memory/1088-5-0x000007FEF7B20000-0x000007FEF7D9A000-memory.dmpFilesize
2.5MB
-
memory/2004-2-0x0000000076641000-0x0000000076643000-memory.dmpFilesize
8KB
-
memory/2004-3-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2004-4-0x00000000002A0000-0x00000000002BA000-memory.dmpFilesize
104KB