Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
28-10-2022 06:05
Static task
static1
Behavioral task
behavioral1
Sample
7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe
Resource
win10-20220812-en
windows10-1703-x64
7 signatures
150 seconds
General
-
Target
7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe
-
Size
287KB
-
MD5
7170cc643a9c4b5e35cbff4fdff3a8d7
-
SHA1
d3395f2ff313f8fae082adad9d9e892b860eb747
-
SHA256
7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679
-
SHA512
44662d34c37048a7fee0eb11e05818719a15afd618dfbe809c3eed1a903bd1df07eab1d90540e87390498c6b366a73719e7a1bda75a9d5eb4d712186f4436841
-
SSDEEP
6144:YVKVvfInUcpUm6KhJPWje13dCVdKrLXoJ8LL:DIUwdWjenCi/X1
Score
10/10
Malware Config
Extracted
Family
warzonerat
C2
chinagov.duckdns.org:5202
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1968-187-0x0000000000406DA4-mapping.dmp warzonerat behavioral1/memory/1968-277-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/1968-330-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Systegbhhhm.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Systegbhhhm.exe Powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1756 set thread context of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2324 Powershell.exe 2324 Powershell.exe 2324 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe Token: SeDebugPrivilege 2324 Powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2324 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 66 PID 1756 wrote to memory of 2324 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 66 PID 1756 wrote to memory of 2324 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 66 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68 PID 1756 wrote to memory of 1968 1756 7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe"C:\Users\Admin\AppData\Local\Temp\7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\7e96a60f26b252ef89a4e1f3fb4264f224031f6d8c9bc592f3ec715a3307c679.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Systegbhhhm.exe'2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1968
-