Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-05-2022 00:42
Static task
static1
Behavioral task
behavioral1
Sample
035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe
Resource
win10v2004-20220414-en
General
-
Target
035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe
-
Size
592KB
-
MD5
71f641159a0b255e20d6af33d1abd416
-
SHA1
12d5dcb0816ef37a8b38f68e9945661b665a8953
-
SHA256
035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f
-
SHA512
b37303e7f823b9299c519af61cb16d03ff1157c69a9077db77344ebf185eff9a92439a1c42e03361ed037e2e8d7821c2345a89db1b37c4faae162aad1234ddff
Malware Config
Extracted
warzonerat
ngray.duckdns.org:3284
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1080-55-0x0000000000190000-0x00000000001B0000-memory.dmp warzonerat behavioral1/memory/1080-56-0x0000000000280000-0x00000000002A3000-memory.dmp warzonerat behavioral1/memory/1192-69-0x0000000000890000-0x00000000008B3000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 1192 images.exe -
Loads dropped DLL 1 IoCs
Processes:
035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exepid process 1080 035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.execmd.exeimages.exedescription pid process target process PID 1080 wrote to memory of 860 1080 035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe cmd.exe PID 1080 wrote to memory of 860 1080 035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe cmd.exe PID 1080 wrote to memory of 860 1080 035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe cmd.exe PID 1080 wrote to memory of 860 1080 035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe cmd.exe PID 1080 wrote to memory of 1192 1080 035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe images.exe PID 1080 wrote to memory of 1192 1080 035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe images.exe PID 1080 wrote to memory of 1192 1080 035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe images.exe PID 1080 wrote to memory of 1192 1080 035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe images.exe PID 860 wrote to memory of 980 860 cmd.exe reg.exe PID 860 wrote to memory of 980 860 cmd.exe reg.exe PID 860 wrote to memory of 980 860 cmd.exe reg.exe PID 860 wrote to memory of 980 860 cmd.exe reg.exe PID 1192 wrote to memory of 1340 1192 images.exe cmd.exe PID 1192 wrote to memory of 1340 1192 images.exe cmd.exe PID 1192 wrote to memory of 1340 1192 images.exe cmd.exe PID 1192 wrote to memory of 1340 1192 images.exe cmd.exe PID 1192 wrote to memory of 1340 1192 images.exe cmd.exe PID 1192 wrote to memory of 1340 1192 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe"C:\Users\Admin\AppData\Local\Temp\035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /f /v Load /t REG_SZ /d "C:\ProgramData\images.exe"3⤵PID:980
-
-
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1340
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD571f641159a0b255e20d6af33d1abd416
SHA112d5dcb0816ef37a8b38f68e9945661b665a8953
SHA256035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f
SHA512b37303e7f823b9299c519af61cb16d03ff1157c69a9077db77344ebf185eff9a92439a1c42e03361ed037e2e8d7821c2345a89db1b37c4faae162aad1234ddff
-
Filesize
592KB
MD571f641159a0b255e20d6af33d1abd416
SHA112d5dcb0816ef37a8b38f68e9945661b665a8953
SHA256035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f
SHA512b37303e7f823b9299c519af61cb16d03ff1157c69a9077db77344ebf185eff9a92439a1c42e03361ed037e2e8d7821c2345a89db1b37c4faae162aad1234ddff
-
Filesize
592KB
MD571f641159a0b255e20d6af33d1abd416
SHA112d5dcb0816ef37a8b38f68e9945661b665a8953
SHA256035ec20b83846152ff2ffb513545aa2cf2d7fb83b81ab1c623ba582c71cd2b7f
SHA512b37303e7f823b9299c519af61cb16d03ff1157c69a9077db77344ebf185eff9a92439a1c42e03361ed037e2e8d7821c2345a89db1b37c4faae162aad1234ddff