Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 18:52
Static task
static1
Behavioral task
behavioral1
Sample
WarzoneRAT-cleaned.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
WarzoneRAT-cleaned.exe
Resource
win10v2004-20220901-en
General
-
Target
WarzoneRAT-cleaned.exe
-
Size
293KB
-
MD5
c39e109ba4d5c3d70f28b118f6b7492c
-
SHA1
06acfb0e75f00480cdde224aac25a7987b24fec5
-
SHA256
1978a07d1ccf042531af3f62bc5228df04f10c9b9b0a6a61ebc98df839bec2f6
-
SHA512
99aa51a58f6ff32004899b05f5afdf8f71044dbb9e750e04e31004726faea98445a0ceb9c7fccc603cccc84f56cd048744be090e77b365e9353a99bebbb02cc1
-
SSDEEP
6144:72GhN2db088fTdUuNU0we+HPps1zcJLVPzGKl5vGlEjqNHk:72iNG088fTWsU0wJBsGJPf
Malware Config
Extracted
warzonerat
168.61.222.215:5400
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1352-56-0x0000000000B80000-0x0000000000BA8000-memory.dmp rezer0 -
Warzone RAT payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1376-65-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral1/memory/1376-66-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral1/memory/1376-68-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral1/memory/1376-69-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral1/memory/1376-71-0x0000000000405907-mapping.dmp warzonerat behavioral1/memory/1376-70-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral1/memory/1376-74-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat behavioral1/memory/1376-75-0x0000000000400000-0x0000000000553000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
WarzoneRAT-cleaned.exedescription pid process target process PID 1352 set thread context of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
WarzoneRAT-cleaned.exepid process 1352 WarzoneRAT-cleaned.exe 1352 WarzoneRAT-cleaned.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WarzoneRAT-cleaned.exedescription pid process Token: SeDebugPrivilege 1352 WarzoneRAT-cleaned.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
WarzoneRAT-cleaned.exedescription pid process target process PID 1352 wrote to memory of 1112 1352 WarzoneRAT-cleaned.exe schtasks.exe PID 1352 wrote to memory of 1112 1352 WarzoneRAT-cleaned.exe schtasks.exe PID 1352 wrote to memory of 1112 1352 WarzoneRAT-cleaned.exe schtasks.exe PID 1352 wrote to memory of 1112 1352 WarzoneRAT-cleaned.exe schtasks.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe PID 1352 wrote to memory of 1376 1352 WarzoneRAT-cleaned.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WarzoneRAT-cleaned.exe"C:\Users\Admin\AppData\Local\Temp\WarzoneRAT-cleaned.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3B4D.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3B4D.tmpFilesize
1KB
MD557a43910523522081543f546fe7a7803
SHA1ed724131f55ab8f5cc9405889fda1ceb5fdadfe5
SHA256899988253eaff065135cf3ad17eb47f8686709cedcd159960b3cb1ea9db38fd1
SHA5127c625f113cbbe62566daa9a25945b71893d47c9ce66049a353e87582afa76cccf3a4385c691478c93617c2eff9ef936391ed9e7ecb88b6bcae84cca5281874e4
-
memory/1112-58-0x0000000000000000-mapping.dmp
-
memory/1352-54-0x0000000001170000-0x00000000011BE000-memory.dmpFilesize
312KB
-
memory/1352-55-0x00000000004E0000-0x00000000004E8000-memory.dmpFilesize
32KB
-
memory/1352-56-0x0000000000B80000-0x0000000000BA8000-memory.dmpFilesize
160KB
-
memory/1352-57-0x0000000075B51000-0x0000000075B53000-memory.dmpFilesize
8KB
-
memory/1376-63-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/1376-61-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/1376-60-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/1376-65-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/1376-66-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/1376-68-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/1376-69-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/1376-71-0x0000000000405907-mapping.dmp
-
memory/1376-70-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/1376-74-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/1376-75-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB