Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
16-06-2021 03:24
Static task
static1
General
-
Target
-
Size
1007KB
-
MD5
2c5a430bba25700116ef43290096f78b
-
SHA1
f932df755efaac964a7684b16445c5a0330e60d0
-
SHA256
42501637672342127aba0926855810bd7c9f22a3c6c64b8df4716cedd0f8550d
-
SHA512
796d5cdc5127e59844266b604d85c88955b0fe095ecc508e8070dbec380fe4a03fd8ae2070be8dd393844a165b0a223a9691850df16df202b9ef9c80bae52a9a
Malware Config
Extracted
warzonerat
194.5.97.174:1360
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3076-125-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3076-126-0x0000000000405CE2-mapping.dmp warzonerat behavioral2/memory/3076-127-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
description pid process target process PID 4056 set thread context of 3076 4056 [email protected] [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
pid process 4056 [email protected] -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeDebugPrivilege 4056 [email protected] -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
description pid process target process PID 4056 wrote to memory of 2016 4056 [email protected] schtasks.exe PID 4056 wrote to memory of 2016 4056 [email protected] schtasks.exe PID 4056 wrote to memory of 2016 4056 [email protected] schtasks.exe PID 4056 wrote to memory of 3076 4056 [email protected] [email protected] PID 4056 wrote to memory of 3076 4056 [email protected] [email protected] PID 4056 wrote to memory of 3076 4056 [email protected] [email protected] PID 4056 wrote to memory of 3076 4056 [email protected] [email protected] PID 4056 wrote to memory of 3076 4056 [email protected] [email protected] PID 4056 wrote to memory of 3076 4056 [email protected] [email protected] PID 4056 wrote to memory of 3076 4056 [email protected] [email protected] PID 4056 wrote to memory of 3076 4056 [email protected] [email protected] PID 4056 wrote to memory of 3076 4056 [email protected] [email protected] PID 4056 wrote to memory of 3076 4056 [email protected] [email protected] PID 4056 wrote to memory of 3076 4056 [email protected] [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jCAphZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9EC6.tmp"2⤵
- Creates scheduled task(s)
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"{path}"2⤵PID:3076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f90238edfa3e9669b287541c5e7a8c15
SHA1ee447cc2ce87f8c044f4eb9ce72cb839c0b0c06a
SHA256011372ba5919bbc742e4d3abc58ba21003aea74799b840d17792e7a5691f8135
SHA512566d122037b7cfbfaa5616f0464121f928ba3c84a2e121c69d4fff82f110c0a643266c23677c4c030bdc30baa12d14a8f9140e98c84d197dcc11050c2a0105e0