Analysis
-
max time kernel
137s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220715-en -
submitted
25-07-2022 14:28
Static task
static1
Behavioral task
behavioral1
Sample
Payment Swift.exe
Resource
win7-20220715-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Payment Swift.exe
Resource
win10v2004-20220721-en
windows10-2004-x64
23 signatures
150 seconds
General
-
Target
Payment Swift.exe
-
Size
611KB
-
MD5
62ee0d3aebacdbfeaa1b31781398b22c
-
SHA1
28ea8142385b4c64f8157299d3d44d00244c2e6a
-
SHA256
61d43a20936f0a0ed8a535e4eb21535009b271f91e62200b29c92dc46d731c64
-
SHA512
24945a0e303d5ae9854271a93440dbf042e20f45f42d70bb29fd58064ce4f2b66cdc87fa0d2b3440154d74e0fdb3ba6e36c8c89592fade051b07a9a1f967fd47
Score
10/10
Malware Config
Extracted
Family
warzonerat
C2
51.75.209.232:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/1624-65-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/1624-66-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/1624-68-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/1624-71-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/1624-70-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/1624-72-0x0000000000406DA4-mapping.dmp warzonerat behavioral1/memory/1624-75-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/1624-76-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/1624-77-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Swift.exedescription pid process target process PID 1072 set thread context of 1624 1072 Payment Swift.exe Payment Swift.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Payment Swift.exedescription pid process target process PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe PID 1072 wrote to memory of 1624 1072 Payment Swift.exe Payment Swift.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Swift.exe"C:\Users\Admin\AppData\Local\Temp\Payment Swift.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Payment Swift.exe"C:\Users\Admin\AppData\Local\Temp\Payment Swift.exe"2⤵PID:1624
-