Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
14-07-2021 15:36
Static task
static1
Behavioral task
behavioral1
Sample
e1c3891695a70f6cecaa417acc69bb75.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e1c3891695a70f6cecaa417acc69bb75.exe
Resource
win10v20210410
General
-
Target
e1c3891695a70f6cecaa417acc69bb75.exe
-
Size
669KB
-
MD5
e1c3891695a70f6cecaa417acc69bb75
-
SHA1
794aebe0e020616346692c17329df1f406153c51
-
SHA256
e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
-
SHA512
839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
Malware Config
Extracted
warzonerat
dfdgdsasedw.ydns.eu:34566
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Executes dropped EXE 2 IoCs
Processes:
images.exeimages.exepid process 592 images.exe 1884 images.exe -
Loads dropped DLL 2 IoCs
Processes:
e1c3891695a70f6cecaa417acc69bb75.exeimages.exepid process 1648 e1c3891695a70f6cecaa417acc69bb75.exe 592 images.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e1c3891695a70f6cecaa417acc69bb75.exeimages.exedescription pid process target process PID 1996 set thread context of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 592 set thread context of 1884 592 images.exe images.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
e1c3891695a70f6cecaa417acc69bb75.exeimages.exepid process 1996 e1c3891695a70f6cecaa417acc69bb75.exe 1996 e1c3891695a70f6cecaa417acc69bb75.exe 1996 e1c3891695a70f6cecaa417acc69bb75.exe 1996 e1c3891695a70f6cecaa417acc69bb75.exe 1996 e1c3891695a70f6cecaa417acc69bb75.exe 1996 e1c3891695a70f6cecaa417acc69bb75.exe 592 images.exe 592 images.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e1c3891695a70f6cecaa417acc69bb75.exeimages.exedescription pid process Token: SeDebugPrivilege 1996 e1c3891695a70f6cecaa417acc69bb75.exe Token: SeDebugPrivilege 592 images.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
e1c3891695a70f6cecaa417acc69bb75.exee1c3891695a70f6cecaa417acc69bb75.execmd.exeimages.exeimages.exedescription pid process target process PID 1996 wrote to memory of 1644 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1644 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1644 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1644 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1996 wrote to memory of 1648 1996 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1648 wrote to memory of 540 1648 e1c3891695a70f6cecaa417acc69bb75.exe cmd.exe PID 1648 wrote to memory of 540 1648 e1c3891695a70f6cecaa417acc69bb75.exe cmd.exe PID 1648 wrote to memory of 540 1648 e1c3891695a70f6cecaa417acc69bb75.exe cmd.exe PID 1648 wrote to memory of 540 1648 e1c3891695a70f6cecaa417acc69bb75.exe cmd.exe PID 1648 wrote to memory of 592 1648 e1c3891695a70f6cecaa417acc69bb75.exe images.exe PID 1648 wrote to memory of 592 1648 e1c3891695a70f6cecaa417acc69bb75.exe images.exe PID 1648 wrote to memory of 592 1648 e1c3891695a70f6cecaa417acc69bb75.exe images.exe PID 1648 wrote to memory of 592 1648 e1c3891695a70f6cecaa417acc69bb75.exe images.exe PID 540 wrote to memory of 816 540 cmd.exe reg.exe PID 540 wrote to memory of 816 540 cmd.exe reg.exe PID 540 wrote to memory of 816 540 cmd.exe reg.exe PID 540 wrote to memory of 816 540 cmd.exe reg.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 592 wrote to memory of 1884 592 images.exe images.exe PID 1884 wrote to memory of 1052 1884 images.exe cmd.exe PID 1884 wrote to memory of 1052 1884 images.exe cmd.exe PID 1884 wrote to memory of 1052 1884 images.exe cmd.exe PID 1884 wrote to memory of 1052 1884 images.exe cmd.exe PID 1884 wrote to memory of 1052 1884 images.exe cmd.exe PID 1884 wrote to memory of 1052 1884 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1c3891695a70f6cecaa417acc69bb75.exe"C:\Users\Admin\AppData\Local\Temp\e1c3891695a70f6cecaa417acc69bb75.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e1c3891695a70f6cecaa417acc69bb75.exeC:\Users\Admin\AppData\Local\Temp\e1c3891695a70f6cecaa417acc69bb75.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\e1c3891695a70f6cecaa417acc69bb75.exeC:\Users\Admin\AppData\Local\Temp\e1c3891695a70f6cecaa417acc69bb75.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"4⤵
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\images.exeC:\Users\Admin\AppData\Local\Temp\images.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeMD5
e1c3891695a70f6cecaa417acc69bb75
SHA1794aebe0e020616346692c17329df1f406153c51
SHA256e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
SHA512839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
-
C:\ProgramData\images.exeMD5
e1c3891695a70f6cecaa417acc69bb75
SHA1794aebe0e020616346692c17329df1f406153c51
SHA256e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
SHA512839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
-
C:\Users\Admin\AppData\Local\Temp\images.exeMD5
e1c3891695a70f6cecaa417acc69bb75
SHA1794aebe0e020616346692c17329df1f406153c51
SHA256e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
SHA512839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
-
C:\Users\Admin\AppData\Local\Temp\images.exeMD5
e1c3891695a70f6cecaa417acc69bb75
SHA1794aebe0e020616346692c17329df1f406153c51
SHA256e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
SHA512839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
-
\ProgramData\images.exeMD5
e1c3891695a70f6cecaa417acc69bb75
SHA1794aebe0e020616346692c17329df1f406153c51
SHA256e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
SHA512839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
-
\Users\Admin\AppData\Local\Temp\images.exeMD5
e1c3891695a70f6cecaa417acc69bb75
SHA1794aebe0e020616346692c17329df1f406153c51
SHA256e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
SHA512839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
-
memory/540-73-0x0000000000000000-mapping.dmp
-
memory/592-93-0x0000000004D35000-0x0000000004D46000-memory.dmpFilesize
68KB
-
memory/592-78-0x0000000001180000-0x0000000001181000-memory.dmpFilesize
4KB
-
memory/592-81-0x0000000004D30000-0x0000000004D31000-memory.dmpFilesize
4KB
-
memory/592-75-0x0000000000000000-mapping.dmp
-
memory/816-80-0x0000000000000000-mapping.dmp
-
memory/1052-96-0x0000000000000000-mapping.dmp
-
memory/1648-70-0x0000000075D41000-0x0000000075D43000-memory.dmpFilesize
8KB
-
memory/1648-72-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/1648-69-0x0000000000405E28-mapping.dmp
-
memory/1648-68-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/1884-90-0x0000000000405E28-mapping.dmp
-
memory/1884-94-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/1996-71-0x00000000003D5000-0x00000000003E6000-memory.dmpFilesize
68KB
-
memory/1996-59-0x0000000000CC0000-0x0000000000CC1000-memory.dmpFilesize
4KB
-
memory/1996-67-0x0000000005B10000-0x0000000005B6F000-memory.dmpFilesize
380KB
-
memory/1996-62-0x0000000000460000-0x00000000004AA000-memory.dmpFilesize
296KB
-
memory/1996-61-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB