Analysis
-
max time kernel
133s -
max time network
170s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-05-2021 16:10
Static task
static1
Behavioral task
behavioral1
Sample
Order Sample.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Order Sample.exe
Resource
win10v20210410
General
-
Target
Order Sample.exe
-
Size
548KB
-
MD5
019959ee5ce020ae98d3936096ac5236
-
SHA1
748d678080173daebbd8e41858b38b67bcfbc462
-
SHA256
55f6e402d458c2d35fca88a85bc8891d997730198cdfea1313bb66c3107394aa
-
SHA512
c4998b282f57e653d4f43764dac8ea48995c8e08313e9bfc00651adb615cf719ce965ed9d88a311a2aaab820e51221c8171c3761d9ccf960f4cfb3fc11446e79
Malware Config
Extracted
warzonerat
176.31.159.203:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1324-65-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1324-66-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/1324-68-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1848-80-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/1848-83-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
Processes:
images.exeimages.exepid process 1880 images.exe 1848 images.exe -
Loads dropped DLL 1 IoCs
Processes:
Order Sample.exepid process 1324 Order Sample.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Order Sample.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" Order Sample.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Order Sample.exeimages.exedescription pid process target process PID 1672 set thread context of 1324 1672 Order Sample.exe Order Sample.exe PID 1880 set thread context of 1848 1880 images.exe images.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
Order Sample.exeOrder Sample.exeimages.exedescription pid process target process PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1672 wrote to memory of 1324 1672 Order Sample.exe Order Sample.exe PID 1324 wrote to memory of 1880 1324 Order Sample.exe images.exe PID 1324 wrote to memory of 1880 1324 Order Sample.exe images.exe PID 1324 wrote to memory of 1880 1324 Order Sample.exe images.exe PID 1324 wrote to memory of 1880 1324 Order Sample.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe PID 1880 wrote to memory of 1848 1880 images.exe images.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order Sample.exe"C:\Users\Admin\AppData\Local\Temp\Order Sample.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Order Sample.exe"{path}"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\ProgramData\images.exe"{path}"4⤵
- Executes dropped EXE
PID:1848
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
019959ee5ce020ae98d3936096ac5236
SHA1748d678080173daebbd8e41858b38b67bcfbc462
SHA25655f6e402d458c2d35fca88a85bc8891d997730198cdfea1313bb66c3107394aa
SHA512c4998b282f57e653d4f43764dac8ea48995c8e08313e9bfc00651adb615cf719ce965ed9d88a311a2aaab820e51221c8171c3761d9ccf960f4cfb3fc11446e79
-
MD5
019959ee5ce020ae98d3936096ac5236
SHA1748d678080173daebbd8e41858b38b67bcfbc462
SHA25655f6e402d458c2d35fca88a85bc8891d997730198cdfea1313bb66c3107394aa
SHA512c4998b282f57e653d4f43764dac8ea48995c8e08313e9bfc00651adb615cf719ce965ed9d88a311a2aaab820e51221c8171c3761d9ccf960f4cfb3fc11446e79
-
MD5
019959ee5ce020ae98d3936096ac5236
SHA1748d678080173daebbd8e41858b38b67bcfbc462
SHA25655f6e402d458c2d35fca88a85bc8891d997730198cdfea1313bb66c3107394aa
SHA512c4998b282f57e653d4f43764dac8ea48995c8e08313e9bfc00651adb615cf719ce965ed9d88a311a2aaab820e51221c8171c3761d9ccf960f4cfb3fc11446e79
-
MD5
019959ee5ce020ae98d3936096ac5236
SHA1748d678080173daebbd8e41858b38b67bcfbc462
SHA25655f6e402d458c2d35fca88a85bc8891d997730198cdfea1313bb66c3107394aa
SHA512c4998b282f57e653d4f43764dac8ea48995c8e08313e9bfc00651adb615cf719ce965ed9d88a311a2aaab820e51221c8171c3761d9ccf960f4cfb3fc11446e79