Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-05-2021 17:36
Static task
static1
Behavioral task
behavioral1
Sample
D0D1601B11D5CC352CF779EDD08D0CAD.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
D0D1601B11D5CC352CF779EDD08D0CAD.exe
Resource
win10v20210408
General
-
Target
D0D1601B11D5CC352CF779EDD08D0CAD.exe
-
Size
98KB
-
MD5
d0d1601b11d5cc352cf779edd08d0cad
-
SHA1
29de952e850d55c360497387550697534a8d5d2c
-
SHA256
33796c5495a2eaf1fb3bd918cbf6d599c7cbd74462b693a802f834a91fa7ab40
-
SHA512
0d434b0059e5e28fad60a1605402db5754269deeceb0353d40fb05a30656a4b7ed9f77c4994dd9382e92dfb5c4541d83594d4ca638fdfcffb2ee4ac5eaedf879
Malware Config
Extracted
warzonerat
46.101.159.120:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 6 IoCs
Processes:
resource yara_rule \ProgramData\updatechecker.exe warzonerat C:\ProgramData\updatechecker.exe warzonerat C:\ProgramData\updatechecker.exe warzonerat \ProgramData\updatechecker.exe warzonerat \ProgramData\updatechecker.exe warzonerat \ProgramData\updatechecker.exe warzonerat -
Executes dropped EXE 1 IoCs
Processes:
updatechecker.exepid process 2024 updatechecker.exe -
Loads dropped DLL 4 IoCs
Processes:
D0D1601B11D5CC352CF779EDD08D0CAD.exeupdatechecker.exepid process 1096 D0D1601B11D5CC352CF779EDD08D0CAD.exe 2024 updatechecker.exe 2024 updatechecker.exe 2024 updatechecker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
D0D1601B11D5CC352CF779EDD08D0CAD.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Chrome = "C:\\ProgramData\\updatechecker.exe" D0D1601B11D5CC352CF779EDD08D0CAD.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
D0D1601B11D5CC352CF779EDD08D0CAD.exeupdatechecker.exedescription pid process target process PID 1096 wrote to memory of 2024 1096 D0D1601B11D5CC352CF779EDD08D0CAD.exe updatechecker.exe PID 1096 wrote to memory of 2024 1096 D0D1601B11D5CC352CF779EDD08D0CAD.exe updatechecker.exe PID 1096 wrote to memory of 2024 1096 D0D1601B11D5CC352CF779EDD08D0CAD.exe updatechecker.exe PID 1096 wrote to memory of 2024 1096 D0D1601B11D5CC352CF779EDD08D0CAD.exe updatechecker.exe PID 1096 wrote to memory of 2024 1096 D0D1601B11D5CC352CF779EDD08D0CAD.exe updatechecker.exe PID 1096 wrote to memory of 2024 1096 D0D1601B11D5CC352CF779EDD08D0CAD.exe updatechecker.exe PID 1096 wrote to memory of 2024 1096 D0D1601B11D5CC352CF779EDD08D0CAD.exe updatechecker.exe PID 2024 wrote to memory of 1396 2024 updatechecker.exe cmd.exe PID 2024 wrote to memory of 1396 2024 updatechecker.exe cmd.exe PID 2024 wrote to memory of 1396 2024 updatechecker.exe cmd.exe PID 2024 wrote to memory of 1396 2024 updatechecker.exe cmd.exe PID 2024 wrote to memory of 1396 2024 updatechecker.exe cmd.exe PID 2024 wrote to memory of 1396 2024 updatechecker.exe cmd.exe PID 2024 wrote to memory of 1396 2024 updatechecker.exe cmd.exe PID 2024 wrote to memory of 1396 2024 updatechecker.exe cmd.exe PID 2024 wrote to memory of 1396 2024 updatechecker.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\D0D1601B11D5CC352CF779EDD08D0CAD.exe"C:\Users\Admin\AppData\Local\Temp\D0D1601B11D5CC352CF779EDD08D0CAD.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\ProgramData\updatechecker.exe"C:\ProgramData\updatechecker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1396
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d0d1601b11d5cc352cf779edd08d0cad
SHA129de952e850d55c360497387550697534a8d5d2c
SHA25633796c5495a2eaf1fb3bd918cbf6d599c7cbd74462b693a802f834a91fa7ab40
SHA5120d434b0059e5e28fad60a1605402db5754269deeceb0353d40fb05a30656a4b7ed9f77c4994dd9382e92dfb5c4541d83594d4ca638fdfcffb2ee4ac5eaedf879
-
MD5
d0d1601b11d5cc352cf779edd08d0cad
SHA129de952e850d55c360497387550697534a8d5d2c
SHA25633796c5495a2eaf1fb3bd918cbf6d599c7cbd74462b693a802f834a91fa7ab40
SHA5120d434b0059e5e28fad60a1605402db5754269deeceb0353d40fb05a30656a4b7ed9f77c4994dd9382e92dfb5c4541d83594d4ca638fdfcffb2ee4ac5eaedf879
-
MD5
d0d1601b11d5cc352cf779edd08d0cad
SHA129de952e850d55c360497387550697534a8d5d2c
SHA25633796c5495a2eaf1fb3bd918cbf6d599c7cbd74462b693a802f834a91fa7ab40
SHA5120d434b0059e5e28fad60a1605402db5754269deeceb0353d40fb05a30656a4b7ed9f77c4994dd9382e92dfb5c4541d83594d4ca638fdfcffb2ee4ac5eaedf879
-
MD5
d0d1601b11d5cc352cf779edd08d0cad
SHA129de952e850d55c360497387550697534a8d5d2c
SHA25633796c5495a2eaf1fb3bd918cbf6d599c7cbd74462b693a802f834a91fa7ab40
SHA5120d434b0059e5e28fad60a1605402db5754269deeceb0353d40fb05a30656a4b7ed9f77c4994dd9382e92dfb5c4541d83594d4ca638fdfcffb2ee4ac5eaedf879
-
MD5
d0d1601b11d5cc352cf779edd08d0cad
SHA129de952e850d55c360497387550697534a8d5d2c
SHA25633796c5495a2eaf1fb3bd918cbf6d599c7cbd74462b693a802f834a91fa7ab40
SHA5120d434b0059e5e28fad60a1605402db5754269deeceb0353d40fb05a30656a4b7ed9f77c4994dd9382e92dfb5c4541d83594d4ca638fdfcffb2ee4ac5eaedf879
-
MD5
d0d1601b11d5cc352cf779edd08d0cad
SHA129de952e850d55c360497387550697534a8d5d2c
SHA25633796c5495a2eaf1fb3bd918cbf6d599c7cbd74462b693a802f834a91fa7ab40
SHA5120d434b0059e5e28fad60a1605402db5754269deeceb0353d40fb05a30656a4b7ed9f77c4994dd9382e92dfb5c4541d83594d4ca638fdfcffb2ee4ac5eaedf879