Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
22-07-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
sample & list.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
sample & list.exe
Resource
win10v20210408
General
-
Target
sample & list.exe
-
Size
675KB
-
MD5
e5d9171fcddcb7ad12ba356039f961ae
-
SHA1
a093a11278a11d9db0d648fec160ad1b8217ffe4
-
SHA256
52477714f4d4870a73c7ea42a240b4191e895860f0268ef16b5f0c49d338447d
-
SHA512
dfe707354f4c8bac9f9190e04f6775ddaeb9ac1e04baf54f341617cb56e4b10fee63a0df746cff0d1f8b6380e7bb7c097f1235e0779f28d9f17dbb83d649e975
Malware Config
Extracted
warzonerat
msteel1759.ddns.net:47680
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/508-124-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/508-125-0x0000000000405CE2-mapping.dmp warzonerat behavioral2/memory/508-126-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/3444-148-0x0000000000405CE2-mapping.dmp warzonerat behavioral2/memory/3444-156-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
Processes:
images.exeimages.exepid process 2956 images.exe 3444 images.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
sample & list.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" sample & list.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
sample & list.exeimages.exedescription pid process target process PID 656 set thread context of 508 656 sample & list.exe sample & list.exe PID 2956 set thread context of 3444 2956 images.exe images.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
sample & list.exepowershell.exepowershell.exepid process 656 sample & list.exe 656 sample & list.exe 656 sample & list.exe 656 sample & list.exe 200 powershell.exe 200 powershell.exe 200 powershell.exe 908 powershell.exe 908 powershell.exe 908 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
sample & list.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 656 sample & list.exe Token: SeDebugPrivilege 200 powershell.exe Token: SeDebugPrivilege 908 powershell.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
sample & list.exesample & list.exeimages.exeimages.exedescription pid process target process PID 656 wrote to memory of 2880 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 2880 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 2880 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 3992 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 3992 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 3992 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 656 wrote to memory of 508 656 sample & list.exe sample & list.exe PID 508 wrote to memory of 200 508 sample & list.exe powershell.exe PID 508 wrote to memory of 200 508 sample & list.exe powershell.exe PID 508 wrote to memory of 200 508 sample & list.exe powershell.exe PID 508 wrote to memory of 2956 508 sample & list.exe images.exe PID 508 wrote to memory of 2956 508 sample & list.exe images.exe PID 508 wrote to memory of 2956 508 sample & list.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 2956 wrote to memory of 3444 2956 images.exe images.exe PID 3444 wrote to memory of 908 3444 images.exe powershell.exe PID 3444 wrote to memory of 908 3444 images.exe powershell.exe PID 3444 wrote to memory of 908 3444 images.exe powershell.exe PID 3444 wrote to memory of 3508 3444 images.exe cmd.exe PID 3444 wrote to memory of 3508 3444 images.exe cmd.exe PID 3444 wrote to memory of 3508 3444 images.exe cmd.exe PID 3444 wrote to memory of 3508 3444 images.exe cmd.exe PID 3444 wrote to memory of 3508 3444 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample & list.exe"C:\Users\Admin\AppData\Local\Temp\sample & list.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sample & list.exe"C:\Users\Admin\AppData\Local\Temp\sample & list.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\sample & list.exe"C:\Users\Admin\AppData\Local\Temp\sample & list.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\sample & list.exe"C:\Users\Admin\AppData\Local\Temp\sample & list.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeMD5
e5d9171fcddcb7ad12ba356039f961ae
SHA1a093a11278a11d9db0d648fec160ad1b8217ffe4
SHA25652477714f4d4870a73c7ea42a240b4191e895860f0268ef16b5f0c49d338447d
SHA512dfe707354f4c8bac9f9190e04f6775ddaeb9ac1e04baf54f341617cb56e4b10fee63a0df746cff0d1f8b6380e7bb7c097f1235e0779f28d9f17dbb83d649e975
-
C:\ProgramData\images.exeMD5
e5d9171fcddcb7ad12ba356039f961ae
SHA1a093a11278a11d9db0d648fec160ad1b8217ffe4
SHA25652477714f4d4870a73c7ea42a240b4191e895860f0268ef16b5f0c49d338447d
SHA512dfe707354f4c8bac9f9190e04f6775ddaeb9ac1e04baf54f341617cb56e4b10fee63a0df746cff0d1f8b6380e7bb7c097f1235e0779f28d9f17dbb83d649e975
-
C:\ProgramData\images.exeMD5
e5d9171fcddcb7ad12ba356039f961ae
SHA1a093a11278a11d9db0d648fec160ad1b8217ffe4
SHA25652477714f4d4870a73c7ea42a240b4191e895860f0268ef16b5f0c49d338447d
SHA512dfe707354f4c8bac9f9190e04f6775ddaeb9ac1e04baf54f341617cb56e4b10fee63a0df746cff0d1f8b6380e7bb7c097f1235e0779f28d9f17dbb83d649e975
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
717e7c7013b501396e818c9481b75c20
SHA13ef98652b9b0e888d70f7e6052cf3da9f27dfe73
SHA256383e2c68d827da8ce1fc510adeb87da5cfe812e853621114753374c97ff0f540
SHA51282c5e015faed57384f7480db79509be7789ce57b979a97e556eaade1a2d3047e3057273ecfa2877008c7e7944f86b7a62b4bb1a5a523163ead5ffdf7cefe261e
-
memory/200-190-0x0000000008E10000-0x0000000008E11000-memory.dmpFilesize
4KB
-
memory/200-151-0x00000000078B0000-0x00000000078B1000-memory.dmpFilesize
4KB
-
memory/200-183-0x0000000008E30000-0x0000000008E63000-memory.dmpFilesize
204KB
-
memory/200-155-0x0000000008290000-0x0000000008291000-memory.dmpFilesize
4KB
-
memory/200-154-0x0000000007D90000-0x0000000007D91000-memory.dmpFilesize
4KB
-
memory/200-153-0x0000000007920000-0x0000000007921000-memory.dmpFilesize
4KB
-
memory/200-152-0x0000000007840000-0x0000000007841000-memory.dmpFilesize
4KB
-
memory/200-146-0x00000000046C2000-0x00000000046C3000-memory.dmpFilesize
4KB
-
memory/200-127-0x0000000000000000-mapping.dmp
-
memory/200-150-0x00000000070D0000-0x00000000070D1000-memory.dmpFilesize
4KB
-
memory/200-214-0x000000007F1B0000-0x000000007F1B1000-memory.dmpFilesize
4KB
-
memory/200-216-0x0000000009380000-0x0000000009381000-memory.dmpFilesize
4KB
-
memory/200-136-0x0000000004580000-0x0000000004581000-memory.dmpFilesize
4KB
-
memory/200-138-0x0000000007110000-0x0000000007111000-memory.dmpFilesize
4KB
-
memory/200-143-0x00000000046C0000-0x00000000046C1000-memory.dmpFilesize
4KB
-
memory/200-243-0x00000000046C3000-0x00000000046C4000-memory.dmpFilesize
4KB
-
memory/508-126-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/508-125-0x0000000000405CE2-mapping.dmp
-
memory/508-124-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/656-121-0x0000000005470000-0x0000000005471000-memory.dmpFilesize
4KB
-
memory/656-116-0x0000000005260000-0x0000000005261000-memory.dmpFilesize
4KB
-
memory/656-117-0x0000000005240000-0x0000000005241000-memory.dmpFilesize
4KB
-
memory/656-114-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/656-123-0x0000000005510000-0x000000000551F000-memory.dmpFilesize
60KB
-
memory/656-118-0x0000000005300000-0x0000000005348000-memory.dmpFilesize
288KB
-
memory/656-122-0x00000000055B0000-0x00000000055B1000-memory.dmpFilesize
4KB
-
memory/656-119-0x0000000005380000-0x0000000005381000-memory.dmpFilesize
4KB
-
memory/656-120-0x0000000005890000-0x0000000005891000-memory.dmpFilesize
4KB
-
memory/908-169-0x00000000072B2000-0x00000000072B3000-memory.dmpFilesize
4KB
-
memory/908-168-0x00000000072B0000-0x00000000072B1000-memory.dmpFilesize
4KB
-
memory/908-212-0x00000000099B0000-0x00000000099B1000-memory.dmpFilesize
4KB
-
memory/908-158-0x0000000000000000-mapping.dmp
-
memory/908-215-0x000000007F550000-0x000000007F551000-memory.dmpFilesize
4KB
-
memory/908-246-0x00000000072B3000-0x00000000072B4000-memory.dmpFilesize
4KB
-
memory/908-604-0x0000000007440000-0x0000000007441000-memory.dmpFilesize
4KB
-
memory/2956-128-0x0000000000000000-mapping.dmp
-
memory/2956-145-0x0000000005510000-0x0000000005511000-memory.dmpFilesize
4KB
-
memory/3444-148-0x0000000000405CE2-mapping.dmp
-
memory/3444-156-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/3508-175-0x0000000000B60000-0x0000000000B61000-memory.dmpFilesize
4KB
-
memory/3508-159-0x0000000000000000-mapping.dmp