Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
09-07-2021 12:52
Static task
static1
Behavioral task
behavioral1
Sample
SF40_DOC.EXE
Resource
win7v20210410
Behavioral task
behavioral2
Sample
SF40_DOC.EXE
Resource
win10v20210408
General
-
Target
SF40_DOC.EXE
-
Size
859KB
-
MD5
378b91450d386cf5916fb645b143d89d
-
SHA1
e34a417e9a6a4985de8cf1877d542364c7255dcd
-
SHA256
bfb41f621f57bccd1923f8437a21329666ebd4f826c7ed0f7540d54f464ad7b5
-
SHA512
c5db058ddfae775203c41fcf29a69e5420017722b32ca446f019e8f15cc9a4c7aa07f64fb95b5ecac5fcd6ffc8020dfb093d869f6f853bfccd1f512253d3f2dd
Malware Config
Extracted
warzonerat
165.22.5.66:6666
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1060-70-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1060-71-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/1060-73-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SF40_DOC.EXEdescription pid process target process PID 1100 set thread context of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
SF40_DOC.EXEpid process 1100 SF40_DOC.EXE 1100 SF40_DOC.EXE 1100 SF40_DOC.EXE 1100 SF40_DOC.EXE 1100 SF40_DOC.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SF40_DOC.EXEdescription pid process Token: SeDebugPrivilege 1100 SF40_DOC.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
SF40_DOC.EXEdescription pid process target process PID 1100 wrote to memory of 340 1100 SF40_DOC.EXE schtasks.exe PID 1100 wrote to memory of 340 1100 SF40_DOC.EXE schtasks.exe PID 1100 wrote to memory of 340 1100 SF40_DOC.EXE schtasks.exe PID 1100 wrote to memory of 340 1100 SF40_DOC.EXE schtasks.exe PID 1100 wrote to memory of 1332 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1332 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1332 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1332 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE PID 1100 wrote to memory of 1060 1100 SF40_DOC.EXE SF40_DOC.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\SF40_DOC.EXE"C:\Users\Admin\AppData\Local\Temp\SF40_DOC.EXE"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QBlHdeDC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF69E.tmp"2⤵
- Creates scheduled task(s)
PID:340 -
C:\Users\Admin\AppData\Local\Temp\SF40_DOC.EXE"C:\Users\Admin\AppData\Local\Temp\SF40_DOC.EXE"2⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\SF40_DOC.EXE"C:\Users\Admin\AppData\Local\Temp\SF40_DOC.EXE"2⤵PID:1060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
bcc069e675795dd2302e0dde8255319a
SHA164613ec82b0a5d1b1bc07725a5f3defd06ab8458
SHA256e88cd5c9b1e840dcf7c4b24676c097cff52f5359290de28b440e1b479f825beb
SHA5125d4a2c5c3e2d9b79514f2ac2481b6594a7c6e6e07d03f4915333b522ca55dea8e7b5144b0d15fd662fcd8a82eede0840a719144cd0927da5ba370f1e627b9d6c