Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
07-04-2021 05:56
Static task
static1
Behavioral task
behavioral1
Sample
POVdRnvBDNdZ0tZ.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
POVdRnvBDNdZ0tZ.exe
Resource
win10v20201028
General
-
Target
POVdRnvBDNdZ0tZ.exe
-
Size
727KB
-
MD5
9710a8a9857b099694317f05c4da703e
-
SHA1
3faa03b1a2f63f42008c0a736b8faad86f114f5e
-
SHA256
d266e212f266cc2c64e151d3543e34beaed2a3666fa215c2a88d8a042b6e9a4a
-
SHA512
e9efa72bc615bc66a1747bd4db1a979a5f70eee68e859d0d807f26b5f11018000ac4b4d953d1133a3a719dd53cf4ea1710da9a37f2da3f95f88e0cd163a50efc
Malware Config
Extracted
warzonerat
genasispony.hopto.org:4477
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/436-11-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/436-12-0x0000000000405738-mapping.dmp warzonerat behavioral1/memory/436-14-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
POVdRnvBDNdZ0tZ.exedescription pid process target process PID 1044 set thread context of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
POVdRnvBDNdZ0tZ.exepid process 1044 POVdRnvBDNdZ0tZ.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
POVdRnvBDNdZ0tZ.exedescription pid process Token: SeDebugPrivilege 1044 POVdRnvBDNdZ0tZ.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
POVdRnvBDNdZ0tZ.exedescription pid process target process PID 1044 wrote to memory of 1564 1044 POVdRnvBDNdZ0tZ.exe schtasks.exe PID 1044 wrote to memory of 1564 1044 POVdRnvBDNdZ0tZ.exe schtasks.exe PID 1044 wrote to memory of 1564 1044 POVdRnvBDNdZ0tZ.exe schtasks.exe PID 1044 wrote to memory of 1564 1044 POVdRnvBDNdZ0tZ.exe schtasks.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe PID 1044 wrote to memory of 436 1044 POVdRnvBDNdZ0tZ.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\POVdRnvBDNdZ0tZ.exe"C:\Users\Admin\AppData\Local\Temp\POVdRnvBDNdZ0tZ.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SfyomJVdjkYkZC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD365.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpD365.tmpMD5
2c007a92e62669cae8bd33088f63ddd9
SHA172401451b39c6c123cfff9cae755ba3fe53bc7f9
SHA2560210d9448feed12a29696547175302bacbbf3253528f6069a14c472f8bf9d601
SHA512e9b706d06c480cf39be098b80d6d6070578e2f936d9cb6fe411e22cdfa0d9e60bd5ec8a4ea91bb1495ca05204167b7b6cdb191d4aa865ad35080dc8671341d97
-
memory/296-16-0x000007FEF77C0000-0x000007FEF7A3A000-memory.dmpFilesize
2.5MB
-
memory/436-15-0x0000000002830000-0x00000000028B4000-memory.dmpFilesize
528KB
-
memory/436-14-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/436-13-0x00000000760A1000-0x00000000760A3000-memory.dmpFilesize
8KB
-
memory/436-12-0x0000000000405738-mapping.dmp
-
memory/436-11-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1044-6-0x00000000002A0000-0x00000000002A5000-memory.dmpFilesize
20KB
-
memory/1044-8-0x0000000000630000-0x0000000000680000-memory.dmpFilesize
320KB
-
memory/1044-7-0x0000000005F20000-0x0000000005FBE000-memory.dmpFilesize
632KB
-
memory/1044-2-0x0000000074110000-0x00000000747FE000-memory.dmpFilesize
6.9MB
-
memory/1044-5-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/1044-3-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/1564-9-0x0000000000000000-mapping.dmp