Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-05-2021 17:37
Static task
static1
Behavioral task
behavioral1
Sample
4412eb1d_extracted.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4412eb1d_extracted.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
4412eb1d_extracted.exe
-
Size
101KB
-
MD5
dc57435c2506f48097817fb36035c376
-
SHA1
de6f7a47ddebf15527e55a0f423f6adf752b79b8
-
SHA256
fbceecb919805bf25f79b60685f86e29ea203a8be4629853a0e717b43f09016e
-
SHA512
68c2bddd252f6bf8a7c3dbbd135a1858824b4adabb642f3e663defd6c0833cbff26b77dbf4d772fb50ef4e0f606913f860a4b697fb66e6b637c578ba47722ec6
Score
10/10
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
4412eb1d_extracted.exedescription pid process target process PID 424 wrote to memory of 1492 424 4412eb1d_extracted.exe cmd.exe PID 424 wrote to memory of 1492 424 4412eb1d_extracted.exe cmd.exe PID 424 wrote to memory of 1492 424 4412eb1d_extracted.exe cmd.exe PID 424 wrote to memory of 1492 424 4412eb1d_extracted.exe cmd.exe PID 424 wrote to memory of 1492 424 4412eb1d_extracted.exe cmd.exe