Analysis
-
max time kernel
114s -
max time network
41s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
14-06-2021 06:48
Static task
static1
Behavioral task
behavioral1
Sample
Copia de pago.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Copia de pago.exe
Resource
win10v20210410
General
-
Target
Copia de pago.exe
-
Size
1.7MB
-
MD5
b62f2ebe902cfe1cebb85b269f168637
-
SHA1
a11ffcc5ce46c65b8c79a02d9bdcae67f7d250b5
-
SHA256
5470a74090fda229660d99b498602172d806fee8a15ed77887788eb63f0ea785
-
SHA512
45c9b6e32c1a343d3f2c610d48e0f1c439d512806932c90a3e6800502dc9f941b2c5adf51a53a965c60ef5783913c6b036fa14b8e4be5a2509c493e9c7f2641f
Malware Config
Extracted
warzonerat
79.134.225.50:5751
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1312-65-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1312-66-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/1312-68-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 1864 images.exe -
Loads dropped DLL 1 IoCs
Processes:
Copia de pago.exepid process 1312 Copia de pago.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Copia de pago.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" Copia de pago.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Copia de pago.exedescription pid process target process PID 1652 set thread context of 1312 1652 Copia de pago.exe Copia de pago.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Copia de pago.exeCopia de pago.exedescription pid process target process PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1652 wrote to memory of 1312 1652 Copia de pago.exe Copia de pago.exe PID 1312 wrote to memory of 1864 1312 Copia de pago.exe images.exe PID 1312 wrote to memory of 1864 1312 Copia de pago.exe images.exe PID 1312 wrote to memory of 1864 1312 Copia de pago.exe images.exe PID 1312 wrote to memory of 1864 1312 Copia de pago.exe images.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Copia de pago.exe"C:\Users\Admin\AppData\Local\Temp\Copia de pago.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Copia de pago.exe"C:\Users\Admin\AppData\Local\Temp\Copia de pago.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
PID:1864
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b62f2ebe902cfe1cebb85b269f168637
SHA1a11ffcc5ce46c65b8c79a02d9bdcae67f7d250b5
SHA2565470a74090fda229660d99b498602172d806fee8a15ed77887788eb63f0ea785
SHA51245c9b6e32c1a343d3f2c610d48e0f1c439d512806932c90a3e6800502dc9f941b2c5adf51a53a965c60ef5783913c6b036fa14b8e4be5a2509c493e9c7f2641f
-
MD5
b62f2ebe902cfe1cebb85b269f168637
SHA1a11ffcc5ce46c65b8c79a02d9bdcae67f7d250b5
SHA2565470a74090fda229660d99b498602172d806fee8a15ed77887788eb63f0ea785
SHA51245c9b6e32c1a343d3f2c610d48e0f1c439d512806932c90a3e6800502dc9f941b2c5adf51a53a965c60ef5783913c6b036fa14b8e4be5a2509c493e9c7f2641f
-
MD5
b62f2ebe902cfe1cebb85b269f168637
SHA1a11ffcc5ce46c65b8c79a02d9bdcae67f7d250b5
SHA2565470a74090fda229660d99b498602172d806fee8a15ed77887788eb63f0ea785
SHA51245c9b6e32c1a343d3f2c610d48e0f1c439d512806932c90a3e6800502dc9f941b2c5adf51a53a965c60ef5783913c6b036fa14b8e4be5a2509c493e9c7f2641f