Analysis
-
max time kernel
145s -
max time network
177s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
13-07-2021 14:21
Static task
static1
Behavioral task
behavioral1
Sample
2a2c1a9885d3ef548f66188878a59fd2.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
2a2c1a9885d3ef548f66188878a59fd2.exe
Resource
win10v20210410
General
-
Target
2a2c1a9885d3ef548f66188878a59fd2.exe
-
Size
684KB
-
MD5
2a2c1a9885d3ef548f66188878a59fd2
-
SHA1
1d480783f56c4448f074cb55a4e2e01338bfdc3b
-
SHA256
04cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
-
SHA512
8fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
Malware Config
Extracted
warzonerat
byx.z86.ru:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Executes dropped EXE 5 IoCs
Processes:
svchost.exesvchost.exesvchost.exesvchost.exesvchost.exepid process 664 svchost.exe 412 svchost.exe 1640 svchost.exe 616 svchost.exe 812 svchost.exe -
Loads dropped DLL 5 IoCs
Processes:
2a2c1a9885d3ef548f66188878a59fd2.exesvchost.exepid process 316 2a2c1a9885d3ef548f66188878a59fd2.exe 664 svchost.exe 664 svchost.exe 664 svchost.exe 664 svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2a2c1a9885d3ef548f66188878a59fd2.exesvchost.exedescription pid process target process PID 1820 set thread context of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 664 set thread context of 812 664 svchost.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
2a2c1a9885d3ef548f66188878a59fd2.exesvchost.exepid process 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 664 svchost.exe 664 svchost.exe 664 svchost.exe 664 svchost.exe 664 svchost.exe 664 svchost.exe 664 svchost.exe 664 svchost.exe 664 svchost.exe 664 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2a2c1a9885d3ef548f66188878a59fd2.exesvchost.exedescription pid process Token: SeDebugPrivilege 1820 2a2c1a9885d3ef548f66188878a59fd2.exe Token: SeDebugPrivilege 664 svchost.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
2a2c1a9885d3ef548f66188878a59fd2.exe2a2c1a9885d3ef548f66188878a59fd2.execmd.exesvchost.exesvchost.exedescription pid process target process PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 1820 wrote to memory of 316 1820 2a2c1a9885d3ef548f66188878a59fd2.exe 2a2c1a9885d3ef548f66188878a59fd2.exe PID 316 wrote to memory of 752 316 2a2c1a9885d3ef548f66188878a59fd2.exe cmd.exe PID 316 wrote to memory of 752 316 2a2c1a9885d3ef548f66188878a59fd2.exe cmd.exe PID 316 wrote to memory of 752 316 2a2c1a9885d3ef548f66188878a59fd2.exe cmd.exe PID 316 wrote to memory of 752 316 2a2c1a9885d3ef548f66188878a59fd2.exe cmd.exe PID 316 wrote to memory of 664 316 2a2c1a9885d3ef548f66188878a59fd2.exe svchost.exe PID 316 wrote to memory of 664 316 2a2c1a9885d3ef548f66188878a59fd2.exe svchost.exe PID 316 wrote to memory of 664 316 2a2c1a9885d3ef548f66188878a59fd2.exe svchost.exe PID 316 wrote to memory of 664 316 2a2c1a9885d3ef548f66188878a59fd2.exe svchost.exe PID 752 wrote to memory of 1872 752 cmd.exe reg.exe PID 752 wrote to memory of 1872 752 cmd.exe reg.exe PID 752 wrote to memory of 1872 752 cmd.exe reg.exe PID 752 wrote to memory of 1872 752 cmd.exe reg.exe PID 664 wrote to memory of 412 664 svchost.exe svchost.exe PID 664 wrote to memory of 412 664 svchost.exe svchost.exe PID 664 wrote to memory of 412 664 svchost.exe svchost.exe PID 664 wrote to memory of 412 664 svchost.exe svchost.exe PID 664 wrote to memory of 1640 664 svchost.exe svchost.exe PID 664 wrote to memory of 1640 664 svchost.exe svchost.exe PID 664 wrote to memory of 1640 664 svchost.exe svchost.exe PID 664 wrote to memory of 1640 664 svchost.exe svchost.exe PID 664 wrote to memory of 616 664 svchost.exe svchost.exe PID 664 wrote to memory of 616 664 svchost.exe svchost.exe PID 664 wrote to memory of 616 664 svchost.exe svchost.exe PID 664 wrote to memory of 616 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 664 wrote to memory of 812 664 svchost.exe svchost.exe PID 812 wrote to memory of 1732 812 svchost.exe cmd.exe PID 812 wrote to memory of 1732 812 svchost.exe cmd.exe PID 812 wrote to memory of 1732 812 svchost.exe cmd.exe PID 812 wrote to memory of 1732 812 svchost.exe cmd.exe PID 812 wrote to memory of 1732 812 svchost.exe cmd.exe PID 812 wrote to memory of 1732 812 svchost.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a2c1a9885d3ef548f66188878a59fd2.exe"C:\Users\Admin\AppData\Local\Temp\2a2c1a9885d3ef548f66188878a59fd2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2a2c1a9885d3ef548f66188878a59fd2.exeC:\Users\Admin\AppData\Local\Temp\2a2c1a9885d3ef548f66188878a59fd2.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\svchost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\svchost.exe"4⤵
-
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
C:\ProgramData\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
\ProgramData\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
\Users\Admin\AppData\Local\Temp\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
\Users\Admin\AppData\Local\Temp\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
\Users\Admin\AppData\Local\Temp\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
\Users\Admin\AppData\Local\Temp\svchost.exeMD5
2a2c1a9885d3ef548f66188878a59fd2
SHA11d480783f56c4448f074cb55a4e2e01338bfdc3b
SHA25604cde0c2284cc4dc8f8a5aeadafca6819ab9d11dfb76fb7f3a2fbbf91d3c0e5d
SHA5128fb432a4c3d21fcb165e0c8c42700f171cfff554045b6a3e1491db70c506bc7cbfa06ee4a18618af5c5dbf3559abb1f703b60acf88c6c5cc5c40c36d7854d1cf
-
memory/316-71-0x0000000075FE1000-0x0000000075FE3000-memory.dmpFilesize
8KB
-
memory/316-70-0x0000000000405E28-mapping.dmp
-
memory/316-72-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/316-69-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/664-78-0x0000000000890000-0x0000000000891000-memory.dmpFilesize
4KB
-
memory/664-93-0x0000000004285000-0x0000000004296000-memory.dmpFilesize
68KB
-
memory/664-81-0x0000000004280000-0x0000000004281000-memory.dmpFilesize
4KB
-
memory/664-75-0x0000000000000000-mapping.dmp
-
memory/752-73-0x0000000000000000-mapping.dmp
-
memory/812-97-0x0000000000405E28-mapping.dmp
-
memory/812-100-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/1732-102-0x0000000000000000-mapping.dmp
-
memory/1820-59-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/1820-68-0x00000000048A5000-0x00000000048B6000-memory.dmpFilesize
68KB
-
memory/1820-67-0x0000000005A60000-0x0000000005AC2000-memory.dmpFilesize
392KB
-
memory/1820-62-0x00000000020D0000-0x000000000211B000-memory.dmpFilesize
300KB
-
memory/1820-61-0x00000000048A0000-0x00000000048A1000-memory.dmpFilesize
4KB
-
memory/1872-79-0x0000000000000000-mapping.dmp