Analysis
-
max time kernel
105s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24-05-2021 13:50
Static task
static1
Behavioral task
behavioral1
Sample
d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe
Resource
win10v20210410
General
-
Target
d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe
-
Size
946KB
-
MD5
9ff1b2088f56e257a002e806a181a3b8
-
SHA1
af0ac66cf6c48c7b8429acb8053f99160eea5c8c
-
SHA256
d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23
-
SHA512
fe1b9266eca9168462ac4904f5ebda1c8830340a1b1f23066f715616ed2c5fcd472efb0214c95de14b13f5f8180ddfd7edfb24a2e16fde6101c834c93c9ea75e
Malware Config
Extracted
warzonerat
157.55.136.23:5300
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2160-128-0x0000000000405CE2-mapping.dmp warzonerat behavioral2/memory/2160-127-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/2160-129-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exedescription pid process target process PID 1892 set thread context of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exedescription pid process target process PID 1892 wrote to memory of 1860 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe schtasks.exe PID 1892 wrote to memory of 1860 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe schtasks.exe PID 1892 wrote to memory of 1860 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe schtasks.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe PID 1892 wrote to memory of 2160 1892 d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe"C:\Users\Admin\AppData\Local\Temp\d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pldAtNWNb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9849.tmp"2⤵
- Creates scheduled task(s)
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe"C:\Users\Admin\AppData\Local\Temp\d80ef3539826be2df8fc985eada5f191b3ae9eb9eb53dfbb054651d25daafe23.bin.exe"2⤵PID:2160
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bf4438a55f4055994c478bab53dfed88
SHA164d337ff468f97a09aabb9a4bf14604f5e69c428
SHA256375672bd65e297cb758827e0020351eec6dd946b0160fd58f39586d38b3e996d
SHA51227fa7abbed034bcc55814951776fa10b840b1a27000b2dbdce0ae302e22faccc749c0a7c298214c429cd6d9c5071dad84f2927639ddb3c65b32bd4aaccc4c487