Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
12-07-2021 08:44
Static task
static1
Behavioral task
behavioral1
Sample
e6b478f5fc73dc7318854399abf505e3.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
e6b478f5fc73dc7318854399abf505e3.exe
Resource
win10v20210410
General
-
Target
e6b478f5fc73dc7318854399abf505e3.exe
-
Size
908KB
-
MD5
e6b478f5fc73dc7318854399abf505e3
-
SHA1
802fb03026a04b4027c3ff7fdf521d08195f8163
-
SHA256
99f6194509980cce34f244d9dbca6d6931f47a02361db73e0f2fc1fa103c997b
-
SHA512
9f94e00e1b30130e06749868dc5e492b74f47a67169b5e064ab09fc51fba01e4583adf0b3e730852bba272cfb6d7395f8d6c0078addb59f4b6cdd3c1874ae3d4
Malware Config
Extracted
warzonerat
byx.z86.ru:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Executes dropped EXE 4 IoCs
Processes:
svchost.exesvchost.exesvchost.exesvchost.exepid process 2104 svchost.exe 2784 svchost.exe 3008 svchost.exe 3680 svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e6b478f5fc73dc7318854399abf505e3.exesvchost.exedescription pid process target process PID 3904 set thread context of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 2104 set thread context of 3680 2104 svchost.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
svchost.exepid process 2104 svchost.exe 2104 svchost.exe 2104 svchost.exe 2104 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 2104 svchost.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
e6b478f5fc73dc7318854399abf505e3.exee6b478f5fc73dc7318854399abf505e3.execmd.exesvchost.exesvchost.exedescription pid process target process PID 3904 wrote to memory of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 3904 wrote to memory of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 3904 wrote to memory of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 3904 wrote to memory of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 3904 wrote to memory of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 3904 wrote to memory of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 3904 wrote to memory of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 3904 wrote to memory of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 3904 wrote to memory of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 3904 wrote to memory of 1744 3904 e6b478f5fc73dc7318854399abf505e3.exe e6b478f5fc73dc7318854399abf505e3.exe PID 1744 wrote to memory of 416 1744 e6b478f5fc73dc7318854399abf505e3.exe cmd.exe PID 1744 wrote to memory of 416 1744 e6b478f5fc73dc7318854399abf505e3.exe cmd.exe PID 1744 wrote to memory of 416 1744 e6b478f5fc73dc7318854399abf505e3.exe cmd.exe PID 1744 wrote to memory of 2104 1744 e6b478f5fc73dc7318854399abf505e3.exe svchost.exe PID 1744 wrote to memory of 2104 1744 e6b478f5fc73dc7318854399abf505e3.exe svchost.exe PID 1744 wrote to memory of 2104 1744 e6b478f5fc73dc7318854399abf505e3.exe svchost.exe PID 416 wrote to memory of 1120 416 cmd.exe reg.exe PID 416 wrote to memory of 1120 416 cmd.exe reg.exe PID 416 wrote to memory of 1120 416 cmd.exe reg.exe PID 2104 wrote to memory of 2784 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 2784 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 2784 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3008 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3008 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3008 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3680 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3680 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3680 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3680 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3680 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3680 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3680 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3680 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3680 2104 svchost.exe svchost.exe PID 2104 wrote to memory of 3680 2104 svchost.exe svchost.exe PID 3680 wrote to memory of 4028 3680 svchost.exe cmd.exe PID 3680 wrote to memory of 4028 3680 svchost.exe cmd.exe PID 3680 wrote to memory of 4028 3680 svchost.exe cmd.exe PID 3680 wrote to memory of 4028 3680 svchost.exe cmd.exe PID 3680 wrote to memory of 4028 3680 svchost.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6b478f5fc73dc7318854399abf505e3.exe"C:\Users\Admin\AppData\Local\Temp\e6b478f5fc73dc7318854399abf505e3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e6b478f5fc73dc7318854399abf505e3.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\svchost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\svchost.exe"4⤵
-
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\svchost.exe"{path}"4⤵
- Executes dropped EXE
-
C:\ProgramData\svchost.exe"{path}"4⤵
- Executes dropped EXE
-
C:\ProgramData\svchost.exe"{path}"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\svchost.exeMD5
e6b478f5fc73dc7318854399abf505e3
SHA1802fb03026a04b4027c3ff7fdf521d08195f8163
SHA25699f6194509980cce34f244d9dbca6d6931f47a02361db73e0f2fc1fa103c997b
SHA5129f94e00e1b30130e06749868dc5e492b74f47a67169b5e064ab09fc51fba01e4583adf0b3e730852bba272cfb6d7395f8d6c0078addb59f4b6cdd3c1874ae3d4
-
C:\ProgramData\svchost.exeMD5
e6b478f5fc73dc7318854399abf505e3
SHA1802fb03026a04b4027c3ff7fdf521d08195f8163
SHA25699f6194509980cce34f244d9dbca6d6931f47a02361db73e0f2fc1fa103c997b
SHA5129f94e00e1b30130e06749868dc5e492b74f47a67169b5e064ab09fc51fba01e4583adf0b3e730852bba272cfb6d7395f8d6c0078addb59f4b6cdd3c1874ae3d4
-
C:\ProgramData\svchost.exeMD5
e6b478f5fc73dc7318854399abf505e3
SHA1802fb03026a04b4027c3ff7fdf521d08195f8163
SHA25699f6194509980cce34f244d9dbca6d6931f47a02361db73e0f2fc1fa103c997b
SHA5129f94e00e1b30130e06749868dc5e492b74f47a67169b5e064ab09fc51fba01e4583adf0b3e730852bba272cfb6d7395f8d6c0078addb59f4b6cdd3c1874ae3d4
-
C:\ProgramData\svchost.exeMD5
e6b478f5fc73dc7318854399abf505e3
SHA1802fb03026a04b4027c3ff7fdf521d08195f8163
SHA25699f6194509980cce34f244d9dbca6d6931f47a02361db73e0f2fc1fa103c997b
SHA5129f94e00e1b30130e06749868dc5e492b74f47a67169b5e064ab09fc51fba01e4583adf0b3e730852bba272cfb6d7395f8d6c0078addb59f4b6cdd3c1874ae3d4
-
C:\ProgramData\svchost.exeMD5
e6b478f5fc73dc7318854399abf505e3
SHA1802fb03026a04b4027c3ff7fdf521d08195f8163
SHA25699f6194509980cce34f244d9dbca6d6931f47a02361db73e0f2fc1fa103c997b
SHA5129f94e00e1b30130e06749868dc5e492b74f47a67169b5e064ab09fc51fba01e4583adf0b3e730852bba272cfb6d7395f8d6c0078addb59f4b6cdd3c1874ae3d4
-
memory/416-127-0x0000000000000000-mapping.dmp
-
memory/1120-133-0x0000000000000000-mapping.dmp
-
memory/1744-124-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/1744-125-0x0000000000405E28-mapping.dmp
-
memory/1744-126-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/2104-139-0x0000000007C80000-0x000000000817E000-memory.dmpFilesize
5.0MB
-
memory/2104-128-0x0000000000000000-mapping.dmp
-
memory/3680-147-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/3680-145-0x0000000000405E28-mapping.dmp
-
memory/3904-120-0x0000000008C70000-0x0000000008C71000-memory.dmpFilesize
4KB
-
memory/3904-119-0x0000000006E80000-0x000000000737E000-memory.dmpFilesize
5.0MB
-
memory/3904-121-0x0000000007330000-0x0000000007332000-memory.dmpFilesize
8KB
-
memory/3904-114-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/3904-118-0x0000000007090000-0x0000000007091000-memory.dmpFilesize
4KB
-
memory/3904-117-0x0000000006F20000-0x0000000006F21000-memory.dmpFilesize
4KB
-
memory/3904-123-0x0000000004470000-0x00000000044A8000-memory.dmpFilesize
224KB
-
memory/3904-116-0x0000000007380000-0x0000000007381000-memory.dmpFilesize
4KB
-
memory/3904-122-0x000000000A7E0000-0x000000000A864000-memory.dmpFilesize
528KB
-
memory/4028-148-0x0000000000000000-mapping.dmp