Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-07-2021 17:06
Static task
static1
Behavioral task
behavioral1
Sample
Statement SKBMT 01078.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Statement SKBMT 01078.exe
Resource
win10v20210410
General
-
Target
Statement SKBMT 01078.exe
-
Size
1.1MB
-
MD5
2ac95d271159084b2f3f66ebe2fc1318
-
SHA1
70c8964080fef2993c9a3f4cb3f6f9c8a0e10f54
-
SHA256
af96538d76a53512e82dbb6683578b7d44577307722d1c9291cf047f5f471334
-
SHA512
0619dbaa146a64851bd24c7afd04bbaf2c23e002e10a9f83a306079c6edff0e876c32c60e4fc74de64b05dd74aa24b27810572b18efdc4878426a82840649105
Malware Config
Extracted
warzonerat
202.55.132.213:7744
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Statement SKBMT 01078.exedescription pid process target process PID 3724 set thread context of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 3544 powershell.exe 3448 powershell.exe 3544 powershell.exe 3448 powershell.exe 1888 powershell.exe 3544 powershell.exe 3448 powershell.exe 1888 powershell.exe 1888 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Statement SKBMT 01078.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3724 Statement SKBMT 01078.exe Token: SeDebugPrivilege 3544 powershell.exe Token: SeDebugPrivilege 3448 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
Statement SKBMT 01078.exedescription pid process target process PID 3724 wrote to memory of 3544 3724 Statement SKBMT 01078.exe powershell.exe PID 3724 wrote to memory of 3544 3724 Statement SKBMT 01078.exe powershell.exe PID 3724 wrote to memory of 3544 3724 Statement SKBMT 01078.exe powershell.exe PID 3724 wrote to memory of 3448 3724 Statement SKBMT 01078.exe powershell.exe PID 3724 wrote to memory of 3448 3724 Statement SKBMT 01078.exe powershell.exe PID 3724 wrote to memory of 3448 3724 Statement SKBMT 01078.exe powershell.exe PID 3724 wrote to memory of 3960 3724 Statement SKBMT 01078.exe schtasks.exe PID 3724 wrote to memory of 3960 3724 Statement SKBMT 01078.exe schtasks.exe PID 3724 wrote to memory of 3960 3724 Statement SKBMT 01078.exe schtasks.exe PID 3724 wrote to memory of 1888 3724 Statement SKBMT 01078.exe powershell.exe PID 3724 wrote to memory of 1888 3724 Statement SKBMT 01078.exe powershell.exe PID 3724 wrote to memory of 1888 3724 Statement SKBMT 01078.exe powershell.exe PID 3724 wrote to memory of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe PID 3724 wrote to memory of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe PID 3724 wrote to memory of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe PID 3724 wrote to memory of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe PID 3724 wrote to memory of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe PID 3724 wrote to memory of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe PID 3724 wrote to memory of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe PID 3724 wrote to memory of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe PID 3724 wrote to memory of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe PID 3724 wrote to memory of 2120 3724 Statement SKBMT 01078.exe Statement SKBMT 01078.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Statement SKBMT 01078.exe"C:\Users\Admin\AppData\Local\Temp\Statement SKBMT 01078.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Statement SKBMT 01078.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yRSZtJF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yRSZtJF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpED20.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yRSZtJF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Statement SKBMT 01078.exe"C:\Users\Admin\AppData\Local\Temp\Statement SKBMT 01078.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
79ea2bcacda0e0704206d9c57f67dbe9
SHA188635077d2fe8bbe153a5ba10fbc66691690e9f9
SHA2562e365f5a1a007d62f3a179bb5ff469fd8ad8523c4b3196f465689ea24f64ff93
SHA512b6a52dc2873454ce5d2d725c5ea79264a82613bc05213988948c12fe66f4bfb46c076b227d70de45bcd7c2089f7c3a4ee0d1b3651a976e613b48bcc115368122
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
96456f560fdce1d4c4cc6f6b45366bc0
SHA1e977911675d3d4d30ca1046d5b70e17e5856e367
SHA256bc5dbd2a8422064e23b23a794e95bc45c3dbc8dc49b064aa7e52bd1582f19307
SHA512b266800cb753e3a8f82f76eac43d8d19ee32a82aa83abdfd24873f45b1693b995747e7f755449e174d7cd574163565081b91de28b86ec275943eccff91d77497
-
C:\Users\Admin\AppData\Local\Temp\tmpED20.tmpMD5
60d2e68a60bd519db5144ad69d13ddf0
SHA1217d44f26758e9f4cde5379e2ab4a253a482da17
SHA2568aa735c4f4651d818e97103bb5e7fb7fa95c85223480ef512a59e070b68a3691
SHA512530d23056c49f497ac1247f085a68c80f361dfe6e5673995427684074c9499f86f081ac2ab5102f1fe47bedd28bcf87b4c3861407025414f67dab199cec1495a
-
memory/1888-166-0x0000000006E12000-0x0000000006E13000-memory.dmpFilesize
4KB
-
memory/1888-228-0x000000007E550000-0x000000007E551000-memory.dmpFilesize
4KB
-
memory/1888-139-0x0000000000000000-mapping.dmp
-
memory/1888-164-0x0000000006E10000-0x0000000006E11000-memory.dmpFilesize
4KB
-
memory/1888-286-0x0000000006E13000-0x0000000006E14000-memory.dmpFilesize
4KB
-
memory/2120-162-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/2120-143-0x0000000000405E28-mapping.dmp
-
memory/2120-141-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/3448-232-0x0000000006833000-0x0000000006834000-memory.dmpFilesize
4KB
-
memory/3448-224-0x000000007F170000-0x000000007F171000-memory.dmpFilesize
4KB
-
memory/3448-126-0x0000000000000000-mapping.dmp
-
memory/3448-160-0x0000000006832000-0x0000000006833000-memory.dmpFilesize
4KB
-
memory/3448-158-0x0000000006830000-0x0000000006831000-memory.dmpFilesize
4KB
-
memory/3544-145-0x00000000077F0000-0x00000000077F1000-memory.dmpFilesize
4KB
-
memory/3544-167-0x0000000007F90000-0x0000000007F91000-memory.dmpFilesize
4KB
-
memory/3544-137-0x0000000006D20000-0x0000000006D21000-memory.dmpFilesize
4KB
-
memory/3544-142-0x0000000007650000-0x0000000007651000-memory.dmpFilesize
4KB
-
memory/3544-133-0x0000000007020000-0x0000000007021000-memory.dmpFilesize
4KB
-
memory/3544-226-0x0000000004663000-0x0000000004664000-memory.dmpFilesize
4KB
-
memory/3544-153-0x0000000004660000-0x0000000004661000-memory.dmpFilesize
4KB
-
memory/3544-156-0x00000000076E0000-0x00000000076E1000-memory.dmpFilesize
4KB
-
memory/3544-155-0x0000000004662000-0x0000000004663000-memory.dmpFilesize
4KB
-
memory/3544-161-0x00000000080F0000-0x00000000080F1000-memory.dmpFilesize
4KB
-
memory/3544-130-0x0000000000C90000-0x0000000000C91000-memory.dmpFilesize
4KB
-
memory/3544-223-0x000000007EE50000-0x000000007EE51000-memory.dmpFilesize
4KB
-
memory/3544-125-0x0000000000000000-mapping.dmp
-
memory/3544-218-0x00000000092E0000-0x00000000092E1000-memory.dmpFilesize
4KB
-
memory/3544-204-0x0000000008EE0000-0x0000000008EE1000-memory.dmpFilesize
4KB
-
memory/3544-140-0x0000000007730000-0x0000000007731000-memory.dmpFilesize
4KB
-
memory/3544-184-0x0000000008D60000-0x0000000008D93000-memory.dmpFilesize
204KB
-
memory/3544-194-0x0000000008D40000-0x0000000008D41000-memory.dmpFilesize
4KB
-
memory/3724-123-0x0000000012C10000-0x0000000012C82000-memory.dmpFilesize
456KB
-
memory/3724-124-0x0000000000FF0000-0x000000000101D000-memory.dmpFilesize
180KB
-
memory/3724-122-0x0000000005200000-0x000000000522D000-memory.dmpFilesize
180KB
-
memory/3724-114-0x0000000000680000-0x0000000000681000-memory.dmpFilesize
4KB
-
memory/3724-121-0x0000000004F50000-0x0000000004FEC000-memory.dmpFilesize
624KB
-
memory/3724-120-0x00000000052A0000-0x00000000052A1000-memory.dmpFilesize
4KB
-
memory/3724-119-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/3724-118-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/3724-117-0x0000000005590000-0x0000000005591000-memory.dmpFilesize
4KB
-
memory/3724-116-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/3960-127-0x0000000000000000-mapping.dmp