Analysis
-
max time kernel
70s -
max time network
73s -
platform
windows10_x64 -
resource
win10-20220310-en -
submitted
21-03-2022 16:28
Static task
static1
Behavioral task
behavioral1
Sample
4SgcpBifNVPbGl6.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
4SgcpBifNVPbGl6.exe
Resource
win10-20220310-en
General
-
Target
4SgcpBifNVPbGl6.exe
-
Size
966KB
-
MD5
fbe792df5474f73a0b287a21ae093337
-
SHA1
9b9f41e121439f09ceef0d6e8d640f63a2433606
-
SHA256
672ae14fc78158bc3a5b44c20488600a02e54a9d9231420a343885ab7e1c8f4f
-
SHA512
7bb9527211da305efaecd75f02dad41e6c8daffc4b94d09c6af85ab03bc0d4af76dc8ef7383637f534468d32ce06e17893757d7c1ffacbaf4b43787bc450703f
Malware Config
Extracted
warzonerat
103.125.189.167:1998
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1296-128-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/1296-130-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4SgcpBifNVPbGl6.exedescription pid process target process PID 2696 set thread context of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3520 1296 WerFault.exe 4SgcpBifNVPbGl6.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
4SgcpBifNVPbGl6.exepid process 2696 4SgcpBifNVPbGl6.exe 2696 4SgcpBifNVPbGl6.exe 2696 4SgcpBifNVPbGl6.exe 2696 4SgcpBifNVPbGl6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4SgcpBifNVPbGl6.exedescription pid process Token: SeDebugPrivilege 2696 4SgcpBifNVPbGl6.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
4SgcpBifNVPbGl6.exedescription pid process target process PID 2696 wrote to memory of 752 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 752 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 752 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe PID 2696 wrote to memory of 1296 2696 4SgcpBifNVPbGl6.exe 4SgcpBifNVPbGl6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe"C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe"C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe"C:\Users\Admin\AppData\Local\Temp\4SgcpBifNVPbGl6.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 5443⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1296-128-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/1296-130-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2696-118-0x00000000731B0000-0x000000007389E000-memory.dmpFilesize
6.9MB
-
memory/2696-119-0x0000000000C70000-0x0000000000D6A000-memory.dmpFilesize
1000KB
-
memory/2696-120-0x0000000005BC0000-0x00000000060BE000-memory.dmpFilesize
5.0MB
-
memory/2696-121-0x0000000005760000-0x00000000057F2000-memory.dmpFilesize
584KB
-
memory/2696-122-0x00000000056C0000-0x0000000005BBE000-memory.dmpFilesize
5.0MB
-
memory/2696-123-0x00000000056E0000-0x00000000056EA000-memory.dmpFilesize
40KB
-
memory/2696-124-0x00000000059A0000-0x00000000059B8000-memory.dmpFilesize
96KB
-
memory/2696-125-0x0000000007F20000-0x0000000007FBC000-memory.dmpFilesize
624KB
-
memory/2696-126-0x0000000008180000-0x000000000826C000-memory.dmpFilesize
944KB
-
memory/2696-127-0x0000000008370000-0x0000000008392000-memory.dmpFilesize
136KB