Analysis
-
max time kernel
145s -
max time network
162s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-07-2021 11:05
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION-007222021.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
QUOTATION-007222021.exe
Resource
win10v20210410
General
-
Target
QUOTATION-007222021.exe
-
Size
3.0MB
-
MD5
4b25ce6286e4db04124b13ad0227fd77
-
SHA1
53ce201bab5c1de3ab8ce4bf2a89eec54fa25a05
-
SHA256
4d787dca4719a668ec0cca721a93a2ae6b6135a2ddde4f75f2b8b790fb19cc3b
-
SHA512
d245418614f02e6aefc59e9fa24a82827a09bc0150e89b1ff21e89c4c75d75bf14527ec0b8720e5ecce80b5ab8b1651c14b15d0c7786c0c47d123e8c5cd0bdc3
Malware Config
Extracted
warzonerat
194.5.97.145:9976
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3944-114-0x00000000029D0000-0x0000000002B24000-memory.dmp warzonerat behavioral2/memory/3944-119-0x0000000002D60000-0x0000000003860000-memory.dmp warzonerat behavioral2/memory/3024-123-0x0000000002AF0000-0x0000000002C44000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 3024 images.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
QUOTATION-007222021.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" QUOTATION-007222021.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
QUOTATION-007222021.exeimages.exedescription pid process target process PID 3944 wrote to memory of 3024 3944 QUOTATION-007222021.exe images.exe PID 3944 wrote to memory of 3024 3944 QUOTATION-007222021.exe images.exe PID 3944 wrote to memory of 3024 3944 QUOTATION-007222021.exe images.exe PID 3024 wrote to memory of 3964 3024 images.exe cmd.exe PID 3024 wrote to memory of 3964 3024 images.exe cmd.exe PID 3024 wrote to memory of 3964 3024 images.exe cmd.exe PID 3024 wrote to memory of 3964 3024 images.exe cmd.exe PID 3024 wrote to memory of 3964 3024 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION-007222021.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION-007222021.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:3964
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4b25ce6286e4db04124b13ad0227fd77
SHA153ce201bab5c1de3ab8ce4bf2a89eec54fa25a05
SHA2564d787dca4719a668ec0cca721a93a2ae6b6135a2ddde4f75f2b8b790fb19cc3b
SHA512d245418614f02e6aefc59e9fa24a82827a09bc0150e89b1ff21e89c4c75d75bf14527ec0b8720e5ecce80b5ab8b1651c14b15d0c7786c0c47d123e8c5cd0bdc3
-
MD5
4b25ce6286e4db04124b13ad0227fd77
SHA153ce201bab5c1de3ab8ce4bf2a89eec54fa25a05
SHA2564d787dca4719a668ec0cca721a93a2ae6b6135a2ddde4f75f2b8b790fb19cc3b
SHA512d245418614f02e6aefc59e9fa24a82827a09bc0150e89b1ff21e89c4c75d75bf14527ec0b8720e5ecce80b5ab8b1651c14b15d0c7786c0c47d123e8c5cd0bdc3