Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
14-07-2021 15:36
Static task
static1
Behavioral task
behavioral1
Sample
e1c3891695a70f6cecaa417acc69bb75.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e1c3891695a70f6cecaa417acc69bb75.exe
Resource
win10v20210410
General
-
Target
e1c3891695a70f6cecaa417acc69bb75.exe
-
Size
669KB
-
MD5
e1c3891695a70f6cecaa417acc69bb75
-
SHA1
794aebe0e020616346692c17329df1f406153c51
-
SHA256
e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
-
SHA512
839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
Malware Config
Extracted
warzonerat
dfdgdsasedw.ydns.eu:34566
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Executes dropped EXE 2 IoCs
Processes:
images.exeimages.exepid process 1172 images.exe 2736 images.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e1c3891695a70f6cecaa417acc69bb75.exeimages.exedescription pid process target process PID 2388 set thread context of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 1172 set thread context of 2736 1172 images.exe images.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e1c3891695a70f6cecaa417acc69bb75.exeimages.exepid process 2388 e1c3891695a70f6cecaa417acc69bb75.exe 2388 e1c3891695a70f6cecaa417acc69bb75.exe 1172 images.exe 1172 images.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e1c3891695a70f6cecaa417acc69bb75.exeimages.exedescription pid process Token: SeDebugPrivilege 2388 e1c3891695a70f6cecaa417acc69bb75.exe Token: SeDebugPrivilege 1172 images.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
e1c3891695a70f6cecaa417acc69bb75.exee1c3891695a70f6cecaa417acc69bb75.execmd.exeimages.exeimages.exedescription pid process target process PID 2388 wrote to memory of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 2388 wrote to memory of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 2388 wrote to memory of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 2388 wrote to memory of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 2388 wrote to memory of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 2388 wrote to memory of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 2388 wrote to memory of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 2388 wrote to memory of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 2388 wrote to memory of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 2388 wrote to memory of 3292 2388 e1c3891695a70f6cecaa417acc69bb75.exe e1c3891695a70f6cecaa417acc69bb75.exe PID 3292 wrote to memory of 2284 3292 e1c3891695a70f6cecaa417acc69bb75.exe cmd.exe PID 3292 wrote to memory of 2284 3292 e1c3891695a70f6cecaa417acc69bb75.exe cmd.exe PID 3292 wrote to memory of 2284 3292 e1c3891695a70f6cecaa417acc69bb75.exe cmd.exe PID 3292 wrote to memory of 1172 3292 e1c3891695a70f6cecaa417acc69bb75.exe images.exe PID 3292 wrote to memory of 1172 3292 e1c3891695a70f6cecaa417acc69bb75.exe images.exe PID 3292 wrote to memory of 1172 3292 e1c3891695a70f6cecaa417acc69bb75.exe images.exe PID 2284 wrote to memory of 3780 2284 cmd.exe reg.exe PID 2284 wrote to memory of 3780 2284 cmd.exe reg.exe PID 2284 wrote to memory of 3780 2284 cmd.exe reg.exe PID 1172 wrote to memory of 2736 1172 images.exe images.exe PID 1172 wrote to memory of 2736 1172 images.exe images.exe PID 1172 wrote to memory of 2736 1172 images.exe images.exe PID 1172 wrote to memory of 2736 1172 images.exe images.exe PID 1172 wrote to memory of 2736 1172 images.exe images.exe PID 1172 wrote to memory of 2736 1172 images.exe images.exe PID 1172 wrote to memory of 2736 1172 images.exe images.exe PID 1172 wrote to memory of 2736 1172 images.exe images.exe PID 1172 wrote to memory of 2736 1172 images.exe images.exe PID 1172 wrote to memory of 2736 1172 images.exe images.exe PID 2736 wrote to memory of 3824 2736 images.exe cmd.exe PID 2736 wrote to memory of 3824 2736 images.exe cmd.exe PID 2736 wrote to memory of 3824 2736 images.exe cmd.exe PID 2736 wrote to memory of 3824 2736 images.exe cmd.exe PID 2736 wrote to memory of 3824 2736 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1c3891695a70f6cecaa417acc69bb75.exe"C:\Users\Admin\AppData\Local\Temp\e1c3891695a70f6cecaa417acc69bb75.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e1c3891695a70f6cecaa417acc69bb75.exeC:\Users\Admin\AppData\Local\Temp\e1c3891695a70f6cecaa417acc69bb75.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"4⤵
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\images.exeC:\Users\Admin\AppData\Local\Temp\images.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeMD5
e1c3891695a70f6cecaa417acc69bb75
SHA1794aebe0e020616346692c17329df1f406153c51
SHA256e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
SHA512839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
-
C:\ProgramData\images.exeMD5
e1c3891695a70f6cecaa417acc69bb75
SHA1794aebe0e020616346692c17329df1f406153c51
SHA256e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
SHA512839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
-
C:\Users\Admin\AppData\Local\Temp\images.exeMD5
e1c3891695a70f6cecaa417acc69bb75
SHA1794aebe0e020616346692c17329df1f406153c51
SHA256e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
SHA512839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
-
C:\Users\Admin\AppData\Local\Temp\images.exeMD5
e1c3891695a70f6cecaa417acc69bb75
SHA1794aebe0e020616346692c17329df1f406153c51
SHA256e150f981d43106895ce64ebce7b41ae17b0eed49baa4cfc0d8d09c98dd208e8f
SHA512839239a3dda5c6c394d4d352bc2e27a0601ac052b440fb68a8c7c5c55dffd960c718e48ec1f44adc24d1889f58e3a14339ae28fc3ece54d84385feb6c8442e8f
-
memory/1172-141-0x0000000005020000-0x000000000551E000-memory.dmpFilesize
5.0MB
-
memory/1172-132-0x0000000000000000-mapping.dmp
-
memory/2284-131-0x0000000000000000-mapping.dmp
-
memory/2388-120-0x0000000004F90000-0x0000000004FDA000-memory.dmpFilesize
296KB
-
memory/2388-118-0x0000000004D30000-0x0000000004D31000-memory.dmpFilesize
4KB
-
memory/2388-116-0x00000000051C0000-0x00000000051C1000-memory.dmpFilesize
4KB
-
memory/2388-117-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB
-
memory/2388-127-0x00000000072C0000-0x000000000731F000-memory.dmpFilesize
380KB
-
memory/2388-122-0x0000000006F00000-0x0000000006F01000-memory.dmpFilesize
4KB
-
memory/2388-121-0x0000000006E10000-0x0000000006E11000-memory.dmpFilesize
4KB
-
memory/2388-114-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/2388-119-0x0000000004CC0000-0x00000000051BE000-memory.dmpFilesize
5.0MB
-
memory/2736-151-0x0000000000405E28-mapping.dmp
-
memory/2736-154-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/3292-130-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/3292-129-0x0000000000405E28-mapping.dmp
-
memory/3292-128-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/3780-138-0x0000000000000000-mapping.dmp
-
memory/3824-155-0x0000000000000000-mapping.dmp