Analysis
-
max time kernel
147s -
max time network
192s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
10-06-2021 17:52
Static task
static1
Behavioral task
behavioral1
Sample
warzone.dll.exe
Resource
win7v20210408
General
-
Target
warzone.dll.exe
-
Size
113KB
-
MD5
4317b04ad1f8f288ab15c7266240e3fa
-
SHA1
90a49a9bc3cb3adeb354f0d2c21996cd0edb36a6
-
SHA256
e14bd7e2457ab8a930533b2748d9f3623b67f0bae6c0c5f7181fd48446d679aa
-
SHA512
99e2da8cf3a536669fefbc59d5fbffc5e941693827b34ef62edc533d14cb4e78130541d35d97289b6a9db71aab7b45db71af8398f3efc1c2b9baaece65344de2
Malware Config
Extracted
warzonerat
79.134.225.94:5352
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 4 IoCs
Processes:
resource yara_rule \ProgramData\images.exe warzonerat \ProgramData\images.exe warzonerat C:\ProgramData\images.exe warzonerat C:\ProgramData\images.exe warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 1204 images.exe -
Loads dropped DLL 2 IoCs
Processes:
warzone.dll.exepid process 1696 warzone.dll.exe 1696 warzone.dll.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
warzone.dll.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" warzone.dll.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
warzone.dll.exeimages.exedescription pid process target process PID 1696 wrote to memory of 1204 1696 warzone.dll.exe images.exe PID 1696 wrote to memory of 1204 1696 warzone.dll.exe images.exe PID 1696 wrote to memory of 1204 1696 warzone.dll.exe images.exe PID 1696 wrote to memory of 1204 1696 warzone.dll.exe images.exe PID 1204 wrote to memory of 1492 1204 images.exe cmd.exe PID 1204 wrote to memory of 1492 1204 images.exe cmd.exe PID 1204 wrote to memory of 1492 1204 images.exe cmd.exe PID 1204 wrote to memory of 1492 1204 images.exe cmd.exe PID 1204 wrote to memory of 1492 1204 images.exe cmd.exe PID 1204 wrote to memory of 1492 1204 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\warzone.dll.exe"C:\Users\Admin\AppData\Local\Temp\warzone.dll.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1492
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4317b04ad1f8f288ab15c7266240e3fa
SHA190a49a9bc3cb3adeb354f0d2c21996cd0edb36a6
SHA256e14bd7e2457ab8a930533b2748d9f3623b67f0bae6c0c5f7181fd48446d679aa
SHA51299e2da8cf3a536669fefbc59d5fbffc5e941693827b34ef62edc533d14cb4e78130541d35d97289b6a9db71aab7b45db71af8398f3efc1c2b9baaece65344de2
-
MD5
4317b04ad1f8f288ab15c7266240e3fa
SHA190a49a9bc3cb3adeb354f0d2c21996cd0edb36a6
SHA256e14bd7e2457ab8a930533b2748d9f3623b67f0bae6c0c5f7181fd48446d679aa
SHA51299e2da8cf3a536669fefbc59d5fbffc5e941693827b34ef62edc533d14cb4e78130541d35d97289b6a9db71aab7b45db71af8398f3efc1c2b9baaece65344de2
-
MD5
4317b04ad1f8f288ab15c7266240e3fa
SHA190a49a9bc3cb3adeb354f0d2c21996cd0edb36a6
SHA256e14bd7e2457ab8a930533b2748d9f3623b67f0bae6c0c5f7181fd48446d679aa
SHA51299e2da8cf3a536669fefbc59d5fbffc5e941693827b34ef62edc533d14cb4e78130541d35d97289b6a9db71aab7b45db71af8398f3efc1c2b9baaece65344de2
-
MD5
4317b04ad1f8f288ab15c7266240e3fa
SHA190a49a9bc3cb3adeb354f0d2c21996cd0edb36a6
SHA256e14bd7e2457ab8a930533b2748d9f3623b67f0bae6c0c5f7181fd48446d679aa
SHA51299e2da8cf3a536669fefbc59d5fbffc5e941693827b34ef62edc533d14cb4e78130541d35d97289b6a9db71aab7b45db71af8398f3efc1c2b9baaece65344de2