Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
09-06-2021 11:50
Static task
static1
Behavioral task
behavioral1
Sample
doc.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
doc.exe
Resource
win10v20210410
General
-
Target
doc.exe
-
Size
795KB
-
MD5
6dcd993aa9adc6d1f14f0da54e8e7353
-
SHA1
e3bde1a8dc7138e42d9047151a8901ddb4a1e113
-
SHA256
82e883ad6e6fe8e8a480b574fffe77c18f449daa028673e42c0c74a9fd9a30e1
-
SHA512
ca97de74082eeb012e6bde671d3a891371dd691ded049da3137b204cb4a036d25646f23142fe1560485de95d812ce4d8f3f243ceb0336e153c5b828f7bdfc08a
Malware Config
Extracted
warzonerat
157.55.136.23:5300
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3996-118-0x0000000000405CE2-mapping.dmp warzonerat behavioral2/memory/3996-117-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3996-120-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
doc.exedescription pid process target process PID 4044 set thread context of 3996 4044 doc.exe doc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
doc.exedescription pid process target process PID 4044 wrote to memory of 1608 4044 doc.exe schtasks.exe PID 4044 wrote to memory of 1608 4044 doc.exe schtasks.exe PID 4044 wrote to memory of 1608 4044 doc.exe schtasks.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe PID 4044 wrote to memory of 3996 4044 doc.exe doc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc.exe"C:\Users\Admin\AppData\Local\Temp\doc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RizdjVrifUAu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA79B.tmp"2⤵
- Creates scheduled task(s)
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\doc.exe"C:\Users\Admin\AppData\Local\Temp\doc.exe"2⤵PID:3996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
91d17144d935226061046b1b74f85f81
SHA1923a873b2f8f5680abe5c5ff374f3afa07b71492
SHA256242bb293d96fd49bf54b1f7f33ad9da6753bdbff3988b195afaff0c0eb085a0a
SHA512044fa800bda73d39e743123ca05f7f99399f43320f6db82f16b5cb03dcc35e459ed99a5718559f4427df458ee08b0114959343e2bcae41b98bd97c3b83bd4073