Analysis
-
max time kernel
238s -
max time network
311s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
23-07-2021 11:22
Static task
static1
Behavioral task
behavioral1
Sample
text.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
text.exe
Resource
win10v20210408
General
-
Target
text.exe
-
Size
1.1MB
-
MD5
08e321e2f7a4fceebed7d9330c7e627b
-
SHA1
2049c1f290d542fba9690958d97c25c0f9d2b39d
-
SHA256
670a52daaf17c5925d5cb33c03e849a863f11f153d438519ec3c71083a90167b
-
SHA512
f3ed6cf7f15f65878d547be2853376602236d4364f6d53566b8169fc05b26454c031f3b7b5630c5dd340054fdca81fe69f569aad9b1cc06cdef751f7eac3d1f1
Malware Config
Extracted
warzonerat
5.226.138.94:6621
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/384-67-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/384-68-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/384-70-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
text.exedescription pid process target process PID 1820 set thread context of 384 1820 text.exe text.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
text.exedescription pid process Token: SeDebugPrivilege 1820 text.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
text.exedescription pid process target process PID 1820 wrote to memory of 888 1820 text.exe schtasks.exe PID 1820 wrote to memory of 888 1820 text.exe schtasks.exe PID 1820 wrote to memory of 888 1820 text.exe schtasks.exe PID 1820 wrote to memory of 888 1820 text.exe schtasks.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe PID 1820 wrote to memory of 384 1820 text.exe text.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\text.exe"C:\Users\Admin\AppData\Local\Temp\text.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZQNDQxDJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp31DA.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\text.exe"C:\Users\Admin\AppData\Local\Temp\text.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp31DA.tmpMD5
ba3e1cafa69b4032b31d5156003e044a
SHA1af950a7ee0e49b0e9099781b5561ed9393d611da
SHA2565ffe0f638a44ccb5e8e03750889f65a0d744e6b31e5f3e2fc93b36f81fffb98b
SHA5122231a57a3cd02a905e9afa6ff73c8e1ed622a5b37b1dd9b52df9b6fe81bc528f33fd7b620e06d1eb6ff8028e53e0e9334a513adf5193cb77156da68560e89e0f
-
memory/384-67-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/384-68-0x0000000000405CE2-mapping.dmp
-
memory/384-69-0x0000000075FE1000-0x0000000075FE3000-memory.dmpFilesize
8KB
-
memory/384-70-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/888-65-0x0000000000000000-mapping.dmp
-
memory/1820-59-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/1820-61-0x0000000004DD0000-0x0000000004DD1000-memory.dmpFilesize
4KB
-
memory/1820-62-0x00000000004E0000-0x000000000050D000-memory.dmpFilesize
180KB
-
memory/1820-63-0x0000000006FC0000-0x0000000007027000-memory.dmpFilesize
412KB
-
memory/1820-64-0x0000000000810000-0x0000000000832000-memory.dmpFilesize
136KB