Behavioral task
behavioral1
Sample
730e03ac2906fcaf99742c5f160a6aa6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
730e03ac2906fcaf99742c5f160a6aa6.exe
Resource
win10v2004-20220812-en
General
-
Target
730e03ac2906fcaf99742c5f160a6aa6.exe
-
Size
293KB
-
MD5
730e03ac2906fcaf99742c5f160a6aa6
-
SHA1
88fd9d69c9cf5dd6ac83274043ac377f70f3f077
-
SHA256
d1b0015f92c9dae17c744239340fe4035580612c80fd24cf7a8f04cf5a6b74a3
-
SHA512
e03d236f5c84c2b5d81c426637f4949ec2db6939b46a76976d8239402dedfc710b3d6426242d8992ca6949808b6689a891f9a9c0c2ccf5f2b1e98d2ce79da3e5
-
SSDEEP
768:uJDMG6hv9DYcsyOUhyKt5GkEzisR1NFFlDF5EqcdSyxaQgyXYcgN2o67vzFoUoyA:uf6Z91iwpEp1NFFvESLGSN67vzFGV
Malware Config
Extracted
warzonerat
skyrocket.ooguy.com:3015
Signatures
-
Warzone RAT payload 1 IoCs
Processes:
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
730e03ac2906fcaf99742c5f160a6aa6.exe.exe windows x86
97894ad73734f29b380f736aa922a592
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetModuleFileNameW
GetTempPathA
CreateFileA
LockResource
LoadResource
FindResourceW
CreateProcessW
GetModuleHandleA
HeapAlloc
GetProcessHeap
LoadLibraryA
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapFree
HeapReAlloc
VirtualQuery
TerminateThread
CreateThread
LoadLibraryW
GetCurrentThreadId
GetBinaryTypeW
GetTempPathW
GetPrivateProfileStringW
GlobalAlloc
Sleep
SetCurrentDirectoryW
LocalFree
FreeLibrary
WaitForSingleObject
GetCurrentProcess
ReadFile
WaitForMultipleObjects
CreatePipe
PeekNamedPipe
DuplicateHandle
WriteFile
CreateEventA
GetComputerNameW
LoadLibraryExW
FindFirstFileW
FindNextFileW
SetFilePointer
CreateFileW
GetLogicalDriveStringsW
DeleteFileW
GetFileSize
CopyFileW
GetDriveTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateMutexA
ReleaseMutex
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
lstrcmpW
GetTickCount
VirtualFree
lstrcpyW
WideCharToMultiByte
lstrcpyA
lstrcatW
MultiByteToWideChar
lstrcatA
lstrcmpA
lstrlenA
ExpandEnvironmentStringsW
lstrlenW
CloseHandle
GetLastError
SetLastError
SetEvent
SizeofResource
GetCurrentDirectoryW
user32
ToUnicode
PostQuitMessage
RegisterRawInputDevices
GetLastInputInfo
wsprintfA
DefWindowProcA
GetForegroundWindow
MapVirtualKeyA
GetRawInputData
RegisterClassW
CreateWindowExW
DispatchMessageA
wsprintfW
TranslateMessage
GetMessageA
MessageBoxA
GetWindowTextW
advapi32
OpenServiceW
RegQueryInfoKeyW
QueryServiceConfigW
EnumServicesStatusExW
StartServiceW
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegCreateKeyExA
OpenSCManagerW
CloseServiceHandle
GetTokenInformation
LookupAccountSidW
FreeSid
OpenProcessToken
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteValueW
RegSetValueExA
RegDeleteKeyW
RegOpenKeyExW
RegSetValueExW
ChangeServiceConfigW
shell32
ShellExecuteExA
ord680
ShellExecuteA
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ShellExecuteW
urlmon
URLDownloadToFileW
ws2_32
gethostbyname
ntohs
ioctlsocket
WSACleanup
closesocket
shutdown
getaddrinfo
inet_addr
setsockopt
freeaddrinfo
htons
recv
connect
socket
send
WSAStartup
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
shlwapi
StrStrW
StrStrA
PathFindExtensionW
PathFileExistsW
PathFindFileNameW
netapi32
NetUserAdd
NetLocalGroupAddMembers
oleaut32
VariantInit
crypt32
CryptStringToBinaryA
CryptUnprotectData
psapi
GetModuleFileNameExW
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ