Analysis

  • max time kernel
    70s
  • max time network
    73s
  • platform
    windows10_x64
  • resource
    win10-20220310-en
  • submitted
    21-03-2022 16:28

General

  • Target

    4SgcpBifNVPbGl6.exe

  • Size

    966KB

  • MD5

    fbe792df5474f73a0b287a21ae093337

  • SHA1

    9b9f41e121439f09ceef0d6e8d640f63a2433606

  • SHA256

    672ae14fc78158bc3a5b44c20488600a02e54a9d9231420a343885ab7e1c8f4f

  • SHA512

    7bb9527211da305efaecd75f02dad41e6c8daffc4b94d09c6af85ab03bc0d4af76dc8ef7383637f534468d32ce06e17893757d7c1ffacbaf4b43787bc450703f

Malware Config

Extracted

Family

warzonerat

C2

103.125.189.167:1998

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe
    "C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe
      "C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe"
      2⤵
        PID:752
      • C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe
        "C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe"
        2⤵
          PID:1296
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 544
            3⤵
            • Program crash
            PID:3520

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1296-128-0x0000000000400000-0x0000000000554000-memory.dmp
        Filesize

        1.3MB

      • memory/1296-130-0x0000000000400000-0x0000000000554000-memory.dmp
        Filesize

        1.3MB

      • memory/2696-118-0x00000000731B0000-0x000000007389E000-memory.dmp
        Filesize

        6.9MB

      • memory/2696-119-0x0000000000C70000-0x0000000000D6A000-memory.dmp
        Filesize

        1000KB

      • memory/2696-120-0x0000000005BC0000-0x00000000060BE000-memory.dmp
        Filesize

        5.0MB

      • memory/2696-121-0x0000000005760000-0x00000000057F2000-memory.dmp
        Filesize

        584KB

      • memory/2696-122-0x00000000056C0000-0x0000000005BBE000-memory.dmp
        Filesize

        5.0MB

      • memory/2696-123-0x00000000056E0000-0x00000000056EA000-memory.dmp
        Filesize

        40KB

      • memory/2696-124-0x00000000059A0000-0x00000000059B8000-memory.dmp
        Filesize

        96KB

      • memory/2696-125-0x0000000007F20000-0x0000000007FBC000-memory.dmp
        Filesize

        624KB

      • memory/2696-126-0x0000000008180000-0x000000000826C000-memory.dmp
        Filesize

        944KB

      • memory/2696-127-0x0000000008370000-0x0000000008392000-memory.dmp
        Filesize

        136KB