Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
23-07-2021 18:34
Static task
static1
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v20210408
General
-
Target
svchost.exe
-
Size
3.0MB
-
MD5
91f690acfa88c901361ceeb29193b957
-
SHA1
f65a8c9860f424598f6fe3e93ae8a05b182087f5
-
SHA256
bc9f7802dd7825de6574c4eed585c53ab724a975d72b88f9871f477ea23a2716
-
SHA512
9015d3e8e60f24e71fec3fcc37151d600adc7ac4503370efd0cba6033598cde59aecac6b9e7ba27150259ef18bd0e9bd95c625bd771130f39508880532294f96
Malware Config
Extracted
warzonerat
111.90.149.108:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 3492 images.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 3296 powershell.exe 3296 powershell.exe 3296 powershell.exe 3820 powershell.exe 3820 powershell.exe 3820 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3296 powershell.exe Token: SeDebugPrivilege 3820 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
svchost.execmd.exeimages.exedescription pid process target process PID 632 wrote to memory of 3296 632 svchost.exe powershell.exe PID 632 wrote to memory of 3296 632 svchost.exe powershell.exe PID 632 wrote to memory of 3296 632 svchost.exe powershell.exe PID 632 wrote to memory of 2124 632 svchost.exe cmd.exe PID 632 wrote to memory of 2124 632 svchost.exe cmd.exe PID 632 wrote to memory of 2124 632 svchost.exe cmd.exe PID 632 wrote to memory of 3492 632 svchost.exe images.exe PID 632 wrote to memory of 3492 632 svchost.exe images.exe PID 632 wrote to memory of 3492 632 svchost.exe images.exe PID 2124 wrote to memory of 3188 2124 cmd.exe reg.exe PID 2124 wrote to memory of 3188 2124 cmd.exe reg.exe PID 2124 wrote to memory of 3188 2124 cmd.exe reg.exe PID 3492 wrote to memory of 3820 3492 images.exe powershell.exe PID 3492 wrote to memory of 3820 3492 images.exe powershell.exe PID 3492 wrote to memory of 3820 3492 images.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"3⤵
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeMD5
91f690acfa88c901361ceeb29193b957
SHA1f65a8c9860f424598f6fe3e93ae8a05b182087f5
SHA256bc9f7802dd7825de6574c4eed585c53ab724a975d72b88f9871f477ea23a2716
SHA5129015d3e8e60f24e71fec3fcc37151d600adc7ac4503370efd0cba6033598cde59aecac6b9e7ba27150259ef18bd0e9bd95c625bd771130f39508880532294f96
-
C:\ProgramData\images.exeMD5
91f690acfa88c901361ceeb29193b957
SHA1f65a8c9860f424598f6fe3e93ae8a05b182087f5
SHA256bc9f7802dd7825de6574c4eed585c53ab724a975d72b88f9871f477ea23a2716
SHA5129015d3e8e60f24e71fec3fcc37151d600adc7ac4503370efd0cba6033598cde59aecac6b9e7ba27150259ef18bd0e9bd95c625bd771130f39508880532294f96
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
35eda25651e46928a51c083f0bebe1de
SHA1a4c8a9c9a854e163ff0d8651c5b9baf73604383a
SHA256ea3c284032ed3974a75eb1c68b635c8f47787c7760bd1206cae75516cae60f17
SHA5126c28f3b8f7b362cfb9db80c6022352d8e963ef587da559928a4986c17c44ea959aa100cab37735f0b861cfac0f20005332310c3163d987ffca9757e392af3dd4
-
memory/632-114-0x0000000003300000-0x000000000345D000-memory.dmpFilesize
1.4MB
-
memory/632-118-0x0000000003690000-0x0000000004190000-memory.dmpFilesize
11.0MB
-
memory/2124-120-0x0000000000000000-mapping.dmp
-
memory/3188-124-0x0000000000000000-mapping.dmp
-
memory/3296-137-0x0000000007C20000-0x0000000007C21000-memory.dmpFilesize
4KB
-
memory/3296-159-0x0000000008EB0000-0x0000000008EB1000-memory.dmpFilesize
4KB
-
memory/3296-129-0x00000000004D2000-0x00000000004D3000-memory.dmpFilesize
4KB
-
memory/3296-130-0x0000000006CF0000-0x0000000006CF1000-memory.dmpFilesize
4KB
-
memory/3296-131-0x0000000006B60000-0x0000000006B61000-memory.dmpFilesize
4KB
-
memory/3296-132-0x0000000007420000-0x0000000007421000-memory.dmpFilesize
4KB
-
memory/3296-133-0x0000000006C00000-0x0000000006C01000-memory.dmpFilesize
4KB
-
memory/3296-134-0x0000000007530000-0x0000000007531000-memory.dmpFilesize
4KB
-
memory/3296-135-0x0000000007900000-0x0000000007901000-memory.dmpFilesize
4KB
-
memory/3296-136-0x0000000007E00000-0x0000000007E01000-memory.dmpFilesize
4KB
-
memory/3296-127-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB
-
memory/3296-145-0x00000000089C0000-0x00000000089F3000-memory.dmpFilesize
204KB
-
memory/3296-152-0x0000000008980000-0x0000000008981000-memory.dmpFilesize
4KB
-
memory/3296-157-0x0000000008AF0000-0x0000000008AF1000-memory.dmpFilesize
4KB
-
memory/3296-158-0x000000007EDB0000-0x000000007EDB1000-memory.dmpFilesize
4KB
-
memory/3296-128-0x00000000004D0000-0x00000000004D1000-memory.dmpFilesize
4KB
-
memory/3296-169-0x00000000004D3000-0x00000000004D4000-memory.dmpFilesize
4KB
-
memory/3296-353-0x0000000006800000-0x0000000006801000-memory.dmpFilesize
4KB
-
memory/3296-359-0x00000000067F0000-0x00000000067F1000-memory.dmpFilesize
4KB
-
memory/3296-119-0x0000000000000000-mapping.dmp
-
memory/3492-121-0x0000000000000000-mapping.dmp
-
memory/3492-374-0x0000000004110000-0x000000000426D000-memory.dmpFilesize
1.4MB
-
memory/3820-378-0x0000000000000000-mapping.dmp
-
memory/3820-387-0x0000000007780000-0x0000000007781000-memory.dmpFilesize
4KB
-
memory/3820-389-0x0000000004470000-0x0000000004471000-memory.dmpFilesize
4KB
-
memory/3820-390-0x0000000004472000-0x0000000004473000-memory.dmpFilesize
4KB
-
memory/3820-392-0x0000000007B90000-0x0000000007B91000-memory.dmpFilesize
4KB
-
memory/3820-413-0x0000000008FB0000-0x0000000008FB1000-memory.dmpFilesize
4KB
-
memory/3820-429-0x0000000004473000-0x0000000004474000-memory.dmpFilesize
4KB
-
memory/3820-427-0x000000007EB50000-0x000000007EB51000-memory.dmpFilesize
4KB