General

  • Target

    Picture 2.doc

  • Size

    662KB

  • Sample

    210712-3awkns7pf6

  • MD5

    34e3b4a75f2f6a7a7b11296ff6dba01f

  • SHA1

    d10d95285be5981172a1ffc67d4cf1e7ef57e412

  • SHA256

    0366e6f59f94651e2db05a2275584a1fe93f992d937e9666fbec60d78edc6f85

  • SHA512

    b1b013e9d77b27b8b62fe9c04477eec79814330014fd7c9e724d6081bb14500eb207af678bbd86e75c500621d28d1214c23acf696c4aabd4090446ec492c22e1

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

httP://kqz.ugo.si/svchost.exe

Extracted

Family

warzonerat

C2

byx.z86.ru:5200

Targets

    • Target

      Picture 2.doc

    • Size

      662KB

    • MD5

      34e3b4a75f2f6a7a7b11296ff6dba01f

    • SHA1

      d10d95285be5981172a1ffc67d4cf1e7ef57e412

    • SHA256

      0366e6f59f94651e2db05a2275584a1fe93f992d937e9666fbec60d78edc6f85

    • SHA512

      b1b013e9d77b27b8b62fe9c04477eec79814330014fd7c9e724d6081bb14500eb207af678bbd86e75c500621d28d1214c23acf696c4aabd4090446ec492c22e1

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks