Analysis
-
max time kernel
128s -
max time network
148s -
platform
windows10_x64 -
resource
win10-20220310-en -
submitted
06-04-2022 05:02
Static task
static1
Behavioral task
behavioral1
Sample
Quotation9011332.pdf.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
Quotation9011332.pdf.exe
Resource
win10-20220310-en
General
-
Target
Quotation9011332.pdf.exe
-
Size
419KB
-
MD5
5016a372458c81a13e1adaa0baf5aa15
-
SHA1
5a491e0c563d0838d15bf3933b663cb10a285523
-
SHA256
0bb09b028f6802d5f9a967dd0a51f89f3b8fb939315abad0706c22e21651e376
-
SHA512
80025833be31737ee86b365563c7d33931a128ec6f09d2153ecf77aa17c2de9402c2538e631589e5f8c0eac916a84b027b351ee55d2e1b522bd27926cf5d4e7e
Malware Config
Extracted
warzonerat
185.183.98.169:20911
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/160-134-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral2/memory/160-135-0x0000000000405CE2-mapping.dmp warzonerat behavioral2/memory/160-137-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Quotation9011332.pdf.exedescription pid process target process PID 3632 set thread context of 160 3632 Quotation9011332.pdf.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1796 160 WerFault.exe MSBuild.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
Quotation9011332.pdf.exepowershell.exepid process 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 3632 Quotation9011332.pdf.exe 2008 powershell.exe 2008 powershell.exe 2008 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Quotation9011332.pdf.exepowershell.exedescription pid process Token: SeDebugPrivilege 3632 Quotation9011332.pdf.exe Token: SeDebugPrivilege 2008 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Quotation9011332.pdf.exedescription pid process target process PID 3632 wrote to memory of 2008 3632 Quotation9011332.pdf.exe powershell.exe PID 3632 wrote to memory of 2008 3632 Quotation9011332.pdf.exe powershell.exe PID 3632 wrote to memory of 2008 3632 Quotation9011332.pdf.exe powershell.exe PID 3632 wrote to memory of 3608 3632 Quotation9011332.pdf.exe schtasks.exe PID 3632 wrote to memory of 3608 3632 Quotation9011332.pdf.exe schtasks.exe PID 3632 wrote to memory of 3608 3632 Quotation9011332.pdf.exe schtasks.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe PID 3632 wrote to memory of 160 3632 Quotation9011332.pdf.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation9011332.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quotation9011332.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\cnLTZKlLCDiW.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cnLTZKlLCDiW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5FEB.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 160 -s 5403⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5FEB.tmpFilesize
1KB
MD5aabe5cd795048f146d3e8efbe16088d2
SHA1bd46090554af5ee2ee017596d08d8b79103d664a
SHA256fdb15499152f1fb6ac01d366b1e65b382b3aff585016cff24fa0769de30a4acc
SHA51269dc9ee11910683fb804e117978362aedc6f1054b473a71e7a22acee592aa1d357e2f81527eb1bd80ebe4b23fef64ef3d452544df66e5e412e9973a0fb74d9d1
-
memory/160-137-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/160-135-0x0000000000405CE2-mapping.dmp
-
memory/160-134-0x0000000000400000-0x0000000000554000-memory.dmpFilesize
1.3MB
-
memory/2008-142-0x0000000007F40000-0x0000000007F8B000-memory.dmpFilesize
300KB
-
memory/2008-138-0x0000000007610000-0x0000000007632000-memory.dmpFilesize
136KB
-
memory/2008-357-0x00000000093D0000-0x00000000093D8000-memory.dmpFilesize
32KB
-
memory/2008-352-0x00000000093E0000-0x00000000093FA000-memory.dmpFilesize
104KB
-
memory/2008-126-0x0000000000000000-mapping.dmp
-
memory/2008-159-0x0000000009430000-0x00000000094C4000-memory.dmpFilesize
592KB
-
memory/2008-158-0x0000000009280000-0x0000000009325000-memory.dmpFilesize
660KB
-
memory/2008-131-0x0000000000EE0000-0x0000000000F16000-memory.dmpFilesize
216KB
-
memory/2008-132-0x0000000006FB0000-0x00000000075D8000-memory.dmpFilesize
6.2MB
-
memory/2008-153-0x0000000008F10000-0x0000000008F2E000-memory.dmpFilesize
120KB
-
memory/2008-152-0x0000000009150000-0x0000000009183000-memory.dmpFilesize
204KB
-
memory/2008-143-0x00000000080A0000-0x0000000008116000-memory.dmpFilesize
472KB
-
memory/2008-141-0x0000000007C50000-0x0000000007C6C000-memory.dmpFilesize
112KB
-
memory/2008-140-0x0000000007900000-0x0000000007C50000-memory.dmpFilesize
3.3MB
-
memory/2008-139-0x0000000007890000-0x00000000078F6000-memory.dmpFilesize
408KB
-
memory/3608-127-0x0000000000000000-mapping.dmp
-
memory/3632-123-0x0000000008050000-0x00000000080EC000-memory.dmpFilesize
624KB
-
memory/3632-119-0x0000000005E20000-0x000000000631E000-memory.dmpFilesize
5.0MB
-
memory/3632-118-0x0000000000FB0000-0x0000000001020000-memory.dmpFilesize
448KB
-
memory/3632-120-0x0000000005920000-0x00000000059B2000-memory.dmpFilesize
584KB
-
memory/3632-121-0x0000000005830000-0x000000000583A000-memory.dmpFilesize
40KB
-
memory/3632-133-0x00000000017E0000-0x0000000001804000-memory.dmpFilesize
144KB
-
memory/3632-122-0x0000000005B10000-0x0000000005B1A000-memory.dmpFilesize
40KB
-
memory/3632-125-0x0000000001850000-0x00000000018B6000-memory.dmpFilesize
408KB
-
memory/3632-124-0x0000000008290000-0x00000000082F6000-memory.dmpFilesize
408KB