Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
11-06-2021 02:52
Static task
static1
Behavioral task
behavioral1
Sample
tt.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
tt.exe
Resource
win10v20210408
General
-
Target
tt.exe
-
Size
3.0MB
-
MD5
dbcf9780b5cf4dc830a9f0622a730034
-
SHA1
8b8fb0e31efc48f7ac2c396439dc7bf21e8f55e3
-
SHA256
a00feeae0a1b83aef1d8799207ea717e339c4709a197652d5450cb9f58d48666
-
SHA512
4de12fd737b21057c736bb6f2f9f64607a90fbceb33af8da426467815a4d4343d63a370678c320549c08c54f39d6c1335ceacb101d3d5f541594295aebef4abf
Malware Config
Extracted
warzonerat
54.39.198.162:8842
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1268-60-0x0000000002260000-0x00000000023B4000-memory.dmp warzonerat behavioral1/memory/1268-65-0x0000000002400000-0x0000000002F00000-memory.dmp warzonerat behavioral1/memory/608-70-0x0000000002CE0000-0x0000000002E34000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
Images.exepid process 608 Images.exe -
Loads dropped DLL 1 IoCs
Processes:
tt.exepid process 1268 tt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tt.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images.exe = "C:\\ProgramData\\Images.exe" tt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
tt.exedescription pid process target process PID 1268 wrote to memory of 608 1268 tt.exe Images.exe PID 1268 wrote to memory of 608 1268 tt.exe Images.exe PID 1268 wrote to memory of 608 1268 tt.exe Images.exe PID 1268 wrote to memory of 608 1268 tt.exe Images.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Images.exeMD5
dbcf9780b5cf4dc830a9f0622a730034
SHA18b8fb0e31efc48f7ac2c396439dc7bf21e8f55e3
SHA256a00feeae0a1b83aef1d8799207ea717e339c4709a197652d5450cb9f58d48666
SHA5124de12fd737b21057c736bb6f2f9f64607a90fbceb33af8da426467815a4d4343d63a370678c320549c08c54f39d6c1335ceacb101d3d5f541594295aebef4abf
-
C:\ProgramData\Images.exeMD5
dbcf9780b5cf4dc830a9f0622a730034
SHA18b8fb0e31efc48f7ac2c396439dc7bf21e8f55e3
SHA256a00feeae0a1b83aef1d8799207ea717e339c4709a197652d5450cb9f58d48666
SHA5124de12fd737b21057c736bb6f2f9f64607a90fbceb33af8da426467815a4d4343d63a370678c320549c08c54f39d6c1335ceacb101d3d5f541594295aebef4abf
-
\ProgramData\Images.exeMD5
dbcf9780b5cf4dc830a9f0622a730034
SHA18b8fb0e31efc48f7ac2c396439dc7bf21e8f55e3
SHA256a00feeae0a1b83aef1d8799207ea717e339c4709a197652d5450cb9f58d48666
SHA5124de12fd737b21057c736bb6f2f9f64607a90fbceb33af8da426467815a4d4343d63a370678c320549c08c54f39d6c1335ceacb101d3d5f541594295aebef4abf
-
memory/608-67-0x0000000000000000-mapping.dmp
-
memory/608-70-0x0000000002CE0000-0x0000000002E34000-memory.dmpFilesize
1.3MB
-
memory/1268-59-0x0000000075591000-0x0000000075593000-memory.dmpFilesize
8KB
-
memory/1268-60-0x0000000002260000-0x00000000023B4000-memory.dmpFilesize
1.3MB
-
memory/1268-65-0x0000000002400000-0x0000000002F00000-memory.dmpFilesize
11.0MB