Analysis
-
max time kernel
112s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
06-06-2022 07:42
Static task
static1
Behavioral task
behavioral1
Sample
cargo documents.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cargo documents.pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
cargo documents.pdf.exe
-
Size
183KB
-
MD5
f0bec0deb10b8bc59a5b2d207b4cdeef
-
SHA1
452b936847f131abd4b872815ab35c9b9bcd9cbb
-
SHA256
b4b14f0512858ecd957152f6f21d06070ad3f371206568871d0f92d5a41ecd83
-
SHA512
a57437bba1a5b9bb8ce2754290e80a5ed78adb8a8017305fe30ac1a7a95c5480fd771a7b35ccd048d17dba2409f74e8c407523a0f0aa61559392c4f0fc95164e
Malware Config
Extracted
warzonerat
udooiuyt.dynamic-dns.net:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
suricata: ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin
suricata: ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin
-
suricata: ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound)
suricata: ET MALWARE Ave Maria/Warzone RAT Encrypted CnC Checkin (Inbound)
-
Warzone RAT Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3472-131-0x0000000002E40000-0x0000000002F94000-memory.dmp warzonerat behavioral2/memory/3472-137-0x0000000002440000-0x0000000002E40000-memory.dmp warzonerat behavioral2/memory/4496-159-0x0000000002CE0000-0x0000000002E34000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 4496 images.exe -
Processes:
resource yara_rule behavioral2/memory/3472-130-0x0000000000400000-0x0000000000544000-memory.dmp upx C:\ProgramData\images.exe upx C:\ProgramData\images.exe upx behavioral2/memory/4496-142-0x0000000000400000-0x0000000000544000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cargo documents.pdf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" cargo documents.pdf.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 4500 powershell.exe 4500 powershell.exe 32 powershell.exe 32 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4500 powershell.exe Token: SeDebugPrivilege 32 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
cargo documents.pdf.exeimages.exedescription pid process target process PID 3472 wrote to memory of 4500 3472 cargo documents.pdf.exe powershell.exe PID 3472 wrote to memory of 4500 3472 cargo documents.pdf.exe powershell.exe PID 3472 wrote to memory of 4500 3472 cargo documents.pdf.exe powershell.exe PID 3472 wrote to memory of 4496 3472 cargo documents.pdf.exe images.exe PID 3472 wrote to memory of 4496 3472 cargo documents.pdf.exe images.exe PID 3472 wrote to memory of 4496 3472 cargo documents.pdf.exe images.exe PID 4496 wrote to memory of 32 4496 images.exe powershell.exe PID 4496 wrote to memory of 32 4496 images.exe powershell.exe PID 4496 wrote to memory of 32 4496 images.exe powershell.exe PID 4496 wrote to memory of 4124 4496 images.exe cmd.exe PID 4496 wrote to memory of 4124 4496 images.exe cmd.exe PID 4496 wrote to memory of 4124 4496 images.exe cmd.exe PID 4496 wrote to memory of 4124 4496 images.exe cmd.exe PID 4496 wrote to memory of 4124 4496 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cargo documents.pdf.exe"C:\Users\Admin\AppData\Local\Temp\cargo documents.pdf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeFilesize
183KB
MD5f0bec0deb10b8bc59a5b2d207b4cdeef
SHA1452b936847f131abd4b872815ab35c9b9bcd9cbb
SHA256b4b14f0512858ecd957152f6f21d06070ad3f371206568871d0f92d5a41ecd83
SHA512a57437bba1a5b9bb8ce2754290e80a5ed78adb8a8017305fe30ac1a7a95c5480fd771a7b35ccd048d17dba2409f74e8c407523a0f0aa61559392c4f0fc95164e
-
C:\ProgramData\images.exeFilesize
183KB
MD5f0bec0deb10b8bc59a5b2d207b4cdeef
SHA1452b936847f131abd4b872815ab35c9b9bcd9cbb
SHA256b4b14f0512858ecd957152f6f21d06070ad3f371206568871d0f92d5a41ecd83
SHA512a57437bba1a5b9bb8ce2754290e80a5ed78adb8a8017305fe30ac1a7a95c5480fd771a7b35ccd048d17dba2409f74e8c407523a0f0aa61559392c4f0fc95164e
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5bb467b2d713da20b76e7a7625dd34291
SHA19af8892ea2cb9fee9668ebe972ef52755820c61a
SHA256b28ecffd5fee362cbbbda7168ff8975679f9a0e3df43059328cd4447fb5d4f3e
SHA5125661252486fb07cdf3b71bfe91ef601b5645721263d8ffbe880c216e0c16d1df123951ff0c3d4d4dd37e38f62633962886c7e8dbada7a1886bd52ddadba0c4c7
-
memory/32-170-0x0000000070860000-0x00000000708AC000-memory.dmpFilesize
304KB
-
memory/32-165-0x0000000000000000-mapping.dmp
-
memory/3472-137-0x0000000002440000-0x0000000002E40000-memory.dmpFilesize
10.0MB
-
memory/3472-130-0x0000000000400000-0x0000000000544000-memory.dmpFilesize
1.3MB
-
memory/3472-131-0x0000000002E40000-0x0000000002F94000-memory.dmpFilesize
1.3MB
-
memory/4124-169-0x0000000001200000-0x0000000001201000-memory.dmpFilesize
4KB
-
memory/4124-166-0x0000000000000000-mapping.dmp
-
memory/4496-139-0x0000000000000000-mapping.dmp
-
memory/4496-142-0x0000000000400000-0x0000000000544000-memory.dmpFilesize
1.3MB
-
memory/4496-159-0x0000000002CE0000-0x0000000002E34000-memory.dmpFilesize
1.3MB
-
memory/4500-149-0x0000000006830000-0x0000000006862000-memory.dmpFilesize
200KB
-
memory/4500-158-0x0000000007890000-0x0000000007898000-memory.dmpFilesize
32KB
-
memory/4500-151-0x0000000006810000-0x000000000682E000-memory.dmpFilesize
120KB
-
memory/4500-152-0x0000000007BB0000-0x000000000822A000-memory.dmpFilesize
6.5MB
-
memory/4500-153-0x0000000007570000-0x000000000758A000-memory.dmpFilesize
104KB
-
memory/4500-154-0x00000000075E0000-0x00000000075EA000-memory.dmpFilesize
40KB
-
memory/4500-155-0x00000000077F0000-0x0000000007886000-memory.dmpFilesize
600KB
-
memory/4500-156-0x00000000077A0000-0x00000000077AE000-memory.dmpFilesize
56KB
-
memory/4500-157-0x00000000078B0000-0x00000000078CA000-memory.dmpFilesize
104KB
-
memory/4500-150-0x0000000075010000-0x000000007505C000-memory.dmpFilesize
304KB
-
memory/4500-148-0x0000000006260000-0x000000000627E000-memory.dmpFilesize
120KB
-
memory/4500-147-0x0000000005C60000-0x0000000005CC6000-memory.dmpFilesize
408KB
-
memory/4500-146-0x0000000005B80000-0x0000000005BE6000-memory.dmpFilesize
408KB
-
memory/4500-145-0x00000000052B0000-0x00000000052D2000-memory.dmpFilesize
136KB
-
memory/4500-144-0x00000000054E0000-0x0000000005B08000-memory.dmpFilesize
6.2MB
-
memory/4500-143-0x00000000029B0000-0x00000000029E6000-memory.dmpFilesize
216KB
-
memory/4500-138-0x0000000000000000-mapping.dmp