Analysis
-
max time kernel
149s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 15:05
Behavioral task
behavioral1
Sample
831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe
Resource
win10v2004-20220721-en
General
-
Target
831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe
-
Size
99KB
-
MD5
990a0c672b7c9b32833d8ecdd275cd81
-
SHA1
04d436143bfbe87f09dac7f6ecf9f6ebb68c5081
-
SHA256
831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3
-
SHA512
4a11ca8da42b0ecd3c12462d56a1f4f27dcb02e6bbc4c9b8e988528b2217ebd07dcb3cfe5c51966bff0ba9dc6e44277dd21758d09f09e33d076fb3294a8a28d1
Malware Config
Extracted
warzonerat
office101.warzonedns.com:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000b000000012335-55.dat warzonerat behavioral1/files/0x000b000000012335-56.dat warzonerat behavioral1/files/0x000b000000012335-58.dat warzonerat -
Executes dropped EXE 1 IoCs
pid Process 1912 images.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe 2036 831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" 831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1912 2036 831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe 27 PID 2036 wrote to memory of 1912 2036 831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe 27 PID 2036 wrote to memory of 1912 2036 831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe 27 PID 2036 wrote to memory of 1912 2036 831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe"C:\Users\Admin\AppData\Local\Temp\831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
PID:1912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5990a0c672b7c9b32833d8ecdd275cd81
SHA104d436143bfbe87f09dac7f6ecf9f6ebb68c5081
SHA256831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3
SHA5124a11ca8da42b0ecd3c12462d56a1f4f27dcb02e6bbc4c9b8e988528b2217ebd07dcb3cfe5c51966bff0ba9dc6e44277dd21758d09f09e33d076fb3294a8a28d1
-
Filesize
99KB
MD5990a0c672b7c9b32833d8ecdd275cd81
SHA104d436143bfbe87f09dac7f6ecf9f6ebb68c5081
SHA256831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3
SHA5124a11ca8da42b0ecd3c12462d56a1f4f27dcb02e6bbc4c9b8e988528b2217ebd07dcb3cfe5c51966bff0ba9dc6e44277dd21758d09f09e33d076fb3294a8a28d1
-
Filesize
99KB
MD5990a0c672b7c9b32833d8ecdd275cd81
SHA104d436143bfbe87f09dac7f6ecf9f6ebb68c5081
SHA256831e4102b5901ad809e6a2b2460901b48a8c7c0a6786620e1266c51dd22777c3
SHA5124a11ca8da42b0ecd3c12462d56a1f4f27dcb02e6bbc4c9b8e988528b2217ebd07dcb3cfe5c51966bff0ba9dc6e44277dd21758d09f09e33d076fb3294a8a28d1