Analysis
-
max time kernel
4294176s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
11-03-2022 14:38
Static task
static1
Behavioral task
behavioral1
Sample
File2289.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
File2289.exe
Resource
win10-20220310-en
General
-
Target
File2289.exe
-
Size
734KB
-
MD5
81e2134ec12d6342cf59df927e4352d8
-
SHA1
5c798138ebbdb723a7db9f7cf7d3a3b7cdba9515
-
SHA256
524898ddc5d913718bd872b30e7bfa2eadd322952f6f26f1c671a9271d57456b
-
SHA512
3d762d4ac94425d972e45de67aaea0b835393fc43229853484e8065f068dc4963e08b780686a09dcbaf06fa3d3e99880b2ccb43b5f7b89dde4104e4c69ec0db8
Malware Config
Extracted
warzonerat
84.38.132.36:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/1980-57-0x00000000002F0000-0x0000000000308000-memory.dmp net_reactor -
Warzone RAT Payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/2020-68-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/2020-70-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/2020-72-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/2020-74-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/2020-76-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/2012-80-0x0000000002700000-0x000000000334A000-memory.dmp warzonerat behavioral1/memory/2020-83-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
File2289.exedescription pid process target process PID 1980 set thread context of 2020 1980 File2289.exe File2289.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 728 2020 WerFault.exe File2289.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
File2289.exepowershell.exepid process 1980 File2289.exe 1980 File2289.exe 1980 File2289.exe 1980 File2289.exe 2012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
File2289.exepowershell.exedescription pid process Token: SeDebugPrivilege 1980 File2289.exe Token: SeDebugPrivilege 2012 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
File2289.exeFile2289.exedescription pid process target process PID 1980 wrote to memory of 2012 1980 File2289.exe powershell.exe PID 1980 wrote to memory of 2012 1980 File2289.exe powershell.exe PID 1980 wrote to memory of 2012 1980 File2289.exe powershell.exe PID 1980 wrote to memory of 2012 1980 File2289.exe powershell.exe PID 1980 wrote to memory of 428 1980 File2289.exe schtasks.exe PID 1980 wrote to memory of 428 1980 File2289.exe schtasks.exe PID 1980 wrote to memory of 428 1980 File2289.exe schtasks.exe PID 1980 wrote to memory of 428 1980 File2289.exe schtasks.exe PID 1980 wrote to memory of 1792 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 1792 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 1792 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 1792 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 1980 wrote to memory of 2020 1980 File2289.exe File2289.exe PID 2020 wrote to memory of 728 2020 File2289.exe WerFault.exe PID 2020 wrote to memory of 728 2020 File2289.exe WerFault.exe PID 2020 wrote to memory of 728 2020 File2289.exe WerFault.exe PID 2020 wrote to memory of 728 2020 File2289.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\File2289.exe"C:\Users\Admin\AppData\Local\Temp\File2289.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kbbhCgmYHd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kbbhCgmYHd" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDC6A.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\File2289.exe"C:\Users\Admin\AppData\Local\Temp\File2289.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\File2289.exe"C:\Users\Admin\AppData\Local\Temp\File2289.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 2003⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpDC6A.tmpMD5
236f505cb4ed502b29cae281971b63b0
SHA125a4d3b76cb746e0c2f7ff15d259f02c58b5511b
SHA256bf85996d5cc227417b79ed6e9f0cd27e61f50a21308a3db990ae5803e954ff39
SHA5127c987436c97fde3e6bc758c8f245c0156fdfce008323acb794495e1f8e2551e7c2891b88d1b9da0cb0e4276a38cf1e9ce320e398006c502e070a02382f507806
-
memory/1980-61-0x0000000004530000-0x0000000004552000-memory.dmpFilesize
136KB
-
memory/1980-55-0x00000000740C0000-0x00000000747AE000-memory.dmpFilesize
6.9MB
-
memory/1980-56-0x0000000000420000-0x0000000000421000-memory.dmpFilesize
4KB
-
memory/1980-57-0x00000000002F0000-0x0000000000308000-memory.dmpFilesize
96KB
-
memory/1980-58-0x00000000057E0000-0x0000000005882000-memory.dmpFilesize
648KB
-
memory/1980-54-0x0000000000170000-0x000000000022E000-memory.dmpFilesize
760KB
-
memory/2012-78-0x000000006E450000-0x000000006E9FB000-memory.dmpFilesize
5.7MB
-
memory/2012-59-0x0000000074C61000-0x0000000074C63000-memory.dmpFilesize
8KB
-
memory/2012-84-0x0000000002700000-0x000000000334A000-memory.dmpFilesize
12.3MB
-
memory/2012-81-0x0000000002700000-0x000000000334A000-memory.dmpFilesize
12.3MB
-
memory/2012-82-0x000000006E450000-0x000000006E9FB000-memory.dmpFilesize
5.7MB
-
memory/2012-80-0x0000000002700000-0x000000000334A000-memory.dmpFilesize
12.3MB
-
memory/2020-68-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2020-74-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2020-72-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2020-76-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2020-70-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2020-83-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2020-62-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2020-66-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2020-64-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB