Analysis
-
max time kernel
111s -
max time network
133s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
05-05-2021 15:28
Static task
static1
Behavioral task
behavioral1
Sample
SCB_MT103_31951R2105050031_200505.PDF.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
SCB_MT103_31951R2105050031_200505.PDF.exe
Resource
win10v20210410
General
-
Target
SCB_MT103_31951R2105050031_200505.PDF.exe
-
Size
919KB
-
MD5
cf3e6f4dd1b47b5e9f09f9b1165bb519
-
SHA1
68a1a10ad6b7eaa3d95b7eabefb53097cd44845f
-
SHA256
0288f149c280ae5dc3a27ab06b9cfc41582635226b9759e1aebe4d3e641074b4
-
SHA512
ac7c777dd47373c5a69c56e0948781c77a18731b630916ebbdae354f32ffd05c7e569f6d2b78fc61d4babc7537cf0126fa28c83246a2d2a75fcf499d36628148
Malware Config
Extracted
warzonerat
157.55.136.23:5300
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/940-68-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/940-67-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/940-70-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SCB_MT103_31951R2105050031_200505.PDF.exedescription pid process target process PID 1072 set thread context of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
SCB_MT103_31951R2105050031_200505.PDF.exedescription pid process target process PID 1072 wrote to memory of 1108 1072 SCB_MT103_31951R2105050031_200505.PDF.exe schtasks.exe PID 1072 wrote to memory of 1108 1072 SCB_MT103_31951R2105050031_200505.PDF.exe schtasks.exe PID 1072 wrote to memory of 1108 1072 SCB_MT103_31951R2105050031_200505.PDF.exe schtasks.exe PID 1072 wrote to memory of 1108 1072 SCB_MT103_31951R2105050031_200505.PDF.exe schtasks.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe PID 1072 wrote to memory of 940 1072 SCB_MT103_31951R2105050031_200505.PDF.exe SCB_MT103_31951R2105050031_200505.PDF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SCB_MT103_31951R2105050031_200505.PDF.exe"C:\Users\Admin\AppData\Local\Temp\SCB_MT103_31951R2105050031_200505.PDF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kBnYsHjsxpep" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9D1A.tmp"2⤵
- Creates scheduled task(s)
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\SCB_MT103_31951R2105050031_200505.PDF.exe"C:\Users\Admin\AppData\Local\Temp\SCB_MT103_31951R2105050031_200505.PDF.exe"2⤵PID:940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp9D1A.tmpMD5
f5589598d8c03a6398621b050afc46f4
SHA13113d2ca30d852b9db1d480a55638ded866027d2
SHA256f68d19dc6333ce416f2a1db85f95294e6ad0028632b5efd0913192f6e42fe3dc
SHA5129a68826ac1c44486a57931da08bf4bd2b626e85a19ee417f96a0ddad52d70c7dbad825c49e0cc21afbe9fbbfb6584e995ee9edc3151e6ce2fb61c7f12a4365e6
-
memory/940-68-0x0000000000405CE2-mapping.dmp
-
memory/940-67-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/940-69-0x0000000075411000-0x0000000075413000-memory.dmpFilesize
8KB
-
memory/940-70-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1072-59-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1072-61-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/1072-62-0x00000000006E0000-0x00000000006EE000-memory.dmpFilesize
56KB
-
memory/1072-63-0x0000000004F30000-0x0000000004FCD000-memory.dmpFilesize
628KB
-
memory/1072-64-0x0000000005010000-0x0000000005068000-memory.dmpFilesize
352KB
-
memory/1108-65-0x0000000000000000-mapping.dmp