Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
07-10-2021 21:30
Static task
static1
Behavioral task
behavioral1
Sample
Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe
Resource
win10-en-20210920
General
-
Target
Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe
-
Size
334KB
-
MD5
4176461be62d517adba95d7ab909e7bb
-
SHA1
e53120f9ad641252e41aa677de123152cd72215f
-
SHA256
4bd74f7785ffaf625efdf131775b504966321554e008bd156002f857f866d458
-
SHA512
4e959c76fdd76d5907c467da5168574e1bf320e7c47dec95c20a4e8f87a95c4e69fbbd5f454082295cb0f457f2d1d070d35d364868dfef9e390e1e2075ea07ed
Malware Config
Extracted
warzonerat
176.126.86.243:2021
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4016 created 1896 4016 WerFault.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1896-124-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1896-125-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/1896-126-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1724-141-0x0000000000405CE2-mapping.dmp warzonerat behavioral1/memory/1724-143-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 3 IoCs
Processes:
microsoftupdate.exemicrosoftupdate.exemicrosoftupdate.exepid process 412 microsoftupdate.exe 1824 microsoftupdate.exe 1724 microsoftupdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\windowsdefender = "C:\\ProgramData\\microsoftupdate.exe" Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exemicrosoftupdate.exedescription pid process target process PID 2384 set thread context of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 412 set thread context of 1724 412 microsoftupdate.exe microsoftupdate.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4016 1896 WerFault.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exemicrosoftupdate.exepid process 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe 412 microsoftupdate.exe 412 microsoftupdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exemicrosoftupdate.exedescription pid process Token: SeDebugPrivilege 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Token: SeDebugPrivilege 412 microsoftupdate.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exeScan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exemicrosoftupdate.exemicrosoftupdate.exedescription pid process target process PID 2384 wrote to memory of 2748 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 2748 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 2748 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 2756 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 2756 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 2756 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 2384 wrote to memory of 1896 2384 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe PID 1896 wrote to memory of 412 1896 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe microsoftupdate.exe PID 1896 wrote to memory of 412 1896 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe microsoftupdate.exe PID 1896 wrote to memory of 412 1896 Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe microsoftupdate.exe PID 412 wrote to memory of 1824 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1824 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1824 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 412 wrote to memory of 1724 412 microsoftupdate.exe microsoftupdate.exe PID 1724 wrote to memory of 1988 1724 microsoftupdate.exe cmd.exe PID 1724 wrote to memory of 1988 1724 microsoftupdate.exe cmd.exe PID 1724 wrote to memory of 1988 1724 microsoftupdate.exe cmd.exe PID 1724 wrote to memory of 1988 1724 microsoftupdate.exe cmd.exe PID 1724 wrote to memory of 1988 1724 microsoftupdate.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe"C:\Users\Admin\AppData\Local\Temp\Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe"C:\Users\Admin\AppData\Local\Temp\Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe"C:\Users\Admin\AppData\Local\Temp\Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe"C:\Users\Admin\AppData\Local\Temp\Scan-2021-10-06-89388399008827829020287278299276678292026368298.bat.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\microsoftupdate.exe"C:\ProgramData\microsoftupdate.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\microsoftupdate.exe"C:\ProgramData\microsoftupdate.exe"4⤵
- Executes dropped EXE
-
C:\ProgramData\microsoftupdate.exe"C:\ProgramData\microsoftupdate.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 5803⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\microsoftupdate.exeMD5
4176461be62d517adba95d7ab909e7bb
SHA1e53120f9ad641252e41aa677de123152cd72215f
SHA2564bd74f7785ffaf625efdf131775b504966321554e008bd156002f857f866d458
SHA5124e959c76fdd76d5907c467da5168574e1bf320e7c47dec95c20a4e8f87a95c4e69fbbd5f454082295cb0f457f2d1d070d35d364868dfef9e390e1e2075ea07ed
-
C:\ProgramData\microsoftupdate.exeMD5
4176461be62d517adba95d7ab909e7bb
SHA1e53120f9ad641252e41aa677de123152cd72215f
SHA2564bd74f7785ffaf625efdf131775b504966321554e008bd156002f857f866d458
SHA5124e959c76fdd76d5907c467da5168574e1bf320e7c47dec95c20a4e8f87a95c4e69fbbd5f454082295cb0f457f2d1d070d35d364868dfef9e390e1e2075ea07ed
-
C:\ProgramData\microsoftupdate.exeMD5
4176461be62d517adba95d7ab909e7bb
SHA1e53120f9ad641252e41aa677de123152cd72215f
SHA2564bd74f7785ffaf625efdf131775b504966321554e008bd156002f857f866d458
SHA5124e959c76fdd76d5907c467da5168574e1bf320e7c47dec95c20a4e8f87a95c4e69fbbd5f454082295cb0f457f2d1d070d35d364868dfef9e390e1e2075ea07ed
-
C:\ProgramData\microsoftupdate.exeMD5
4176461be62d517adba95d7ab909e7bb
SHA1e53120f9ad641252e41aa677de123152cd72215f
SHA2564bd74f7785ffaf625efdf131775b504966321554e008bd156002f857f866d458
SHA5124e959c76fdd76d5907c467da5168574e1bf320e7c47dec95c20a4e8f87a95c4e69fbbd5f454082295cb0f457f2d1d070d35d364868dfef9e390e1e2075ea07ed
-
memory/412-127-0x0000000000000000-mapping.dmp
-
memory/412-135-0x00000000053C0000-0x00000000058BE000-memory.dmpFilesize
5.0MB
-
memory/1724-143-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1724-141-0x0000000000405CE2-mapping.dmp
-
memory/1896-126-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1896-125-0x0000000000405CE2-mapping.dmp
-
memory/1896-124-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1988-144-0x0000000000000000-mapping.dmp
-
memory/1988-145-0x00000000007D0000-0x00000000007D1000-memory.dmpFilesize
4KB
-
memory/2384-115-0x0000000000530000-0x0000000000531000-memory.dmpFilesize
4KB
-
memory/2384-123-0x0000000007780000-0x00000000077BF000-memory.dmpFilesize
252KB
-
memory/2384-122-0x0000000005150000-0x000000000515A000-memory.dmpFilesize
40KB
-
memory/2384-121-0x0000000007420000-0x0000000007421000-memory.dmpFilesize
4KB
-
memory/2384-120-0x0000000005000000-0x00000000054FE000-memory.dmpFilesize
5.0MB
-
memory/2384-119-0x0000000004EF0000-0x0000000004EF1000-memory.dmpFilesize
4KB
-
memory/2384-118-0x0000000004F00000-0x0000000004F01000-memory.dmpFilesize
4KB
-
memory/2384-117-0x0000000005500000-0x0000000005501000-memory.dmpFilesize
4KB