Analysis
-
max time kernel
109s -
max time network
322s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
09-06-2021 11:50
Static task
static1
Behavioral task
behavioral1
Sample
doc.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
doc.exe
Resource
win10v20210410
General
-
Target
doc.exe
-
Size
795KB
-
MD5
6dcd993aa9adc6d1f14f0da54e8e7353
-
SHA1
e3bde1a8dc7138e42d9047151a8901ddb4a1e113
-
SHA256
82e883ad6e6fe8e8a480b574fffe77c18f449daa028673e42c0c74a9fd9a30e1
-
SHA512
ca97de74082eeb012e6bde671d3a891371dd691ded049da3137b204cb4a036d25646f23142fe1560485de95d812ce4d8f3f243ceb0336e153c5b828f7bdfc08a
Malware Config
Extracted
warzonerat
157.55.136.23:5300
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/576-65-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/576-64-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/576-67-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
doc.exedescription pid process target process PID 1084 set thread context of 576 1084 doc.exe doc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
doc.exedescription pid process target process PID 1084 wrote to memory of 1664 1084 doc.exe schtasks.exe PID 1084 wrote to memory of 1664 1084 doc.exe schtasks.exe PID 1084 wrote to memory of 1664 1084 doc.exe schtasks.exe PID 1084 wrote to memory of 1664 1084 doc.exe schtasks.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe PID 1084 wrote to memory of 576 1084 doc.exe doc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc.exe"C:\Users\Admin\AppData\Local\Temp\doc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RizdjVrifUAu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp35C0.tmp"2⤵
- Creates scheduled task(s)
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\doc.exe"C:\Users\Admin\AppData\Local\Temp\doc.exe"2⤵PID:576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
dcecd747bce7fc5a709eb097d70db7fd
SHA166fbd3f34a64f86ea58cbf48f02128e13b3570fd
SHA25655212470f03c146a6ae7343438671a07954a0e7f24f90402449379bb3261e6ad
SHA512d08719cf4e565aed125d4b73a459dd8de43b28c97abbacc8e3e8188f3aec0ac0c6639d75ecbd6c76ff72e32ec9f3ad0cb5fc6eab9c46b9e454cd19b9bdf1e962