Analysis
-
max time kernel
113s -
max time network
39s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
08-06-2021 17:35
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe
Resource
win10v20210410
General
-
Target
SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe
-
Size
1.3MB
-
MD5
e7e098ec6c3ca85ffd4cb7f2c4605311
-
SHA1
8d300f5e2ca8375173de14d4319209f16fc1c10e
-
SHA256
a8e9ff8520a1ddf67e25641f39246976117be887b68d8bc24c890ae511723254
-
SHA512
4ba3b152268116d36c33e5e1a7f079b907d68465084da8725225b08de4ffaadc42bc9464806b359ab197031be2bb7554c1d422773f66bc469b2701d96a0b77d0
Malware Config
Extracted
warzonerat
79.134.225.94:5352
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/556-65-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/556-66-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/556-68-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 1288 images.exe -
Loads dropped DLL 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exepid process 556 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exedescription pid process target process PID 320 set thread context of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exeSecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exedescription pid process target process PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 320 wrote to memory of 556 320 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe PID 556 wrote to memory of 1288 556 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe images.exe PID 556 wrote to memory of 1288 556 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe images.exe PID 556 wrote to memory of 1288 556 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe images.exe PID 556 wrote to memory of 1288 556 SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe images.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Save.a.16917.11217.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:556 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
PID:1288
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e7e098ec6c3ca85ffd4cb7f2c4605311
SHA18d300f5e2ca8375173de14d4319209f16fc1c10e
SHA256a8e9ff8520a1ddf67e25641f39246976117be887b68d8bc24c890ae511723254
SHA5124ba3b152268116d36c33e5e1a7f079b907d68465084da8725225b08de4ffaadc42bc9464806b359ab197031be2bb7554c1d422773f66bc469b2701d96a0b77d0
-
MD5
e7e098ec6c3ca85ffd4cb7f2c4605311
SHA18d300f5e2ca8375173de14d4319209f16fc1c10e
SHA256a8e9ff8520a1ddf67e25641f39246976117be887b68d8bc24c890ae511723254
SHA5124ba3b152268116d36c33e5e1a7f079b907d68465084da8725225b08de4ffaadc42bc9464806b359ab197031be2bb7554c1d422773f66bc469b2701d96a0b77d0
-
MD5
e7e098ec6c3ca85ffd4cb7f2c4605311
SHA18d300f5e2ca8375173de14d4319209f16fc1c10e
SHA256a8e9ff8520a1ddf67e25641f39246976117be887b68d8bc24c890ae511723254
SHA5124ba3b152268116d36c33e5e1a7f079b907d68465084da8725225b08de4ffaadc42bc9464806b359ab197031be2bb7554c1d422773f66bc469b2701d96a0b77d0