Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2022 22:35
Static task
static1
Behavioral task
behavioral1
Sample
586d4b57347211b4f9e6548478039e38.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
586d4b57347211b4f9e6548478039e38.exe
Resource
win10v2004-20220812-en
General
-
Target
586d4b57347211b4f9e6548478039e38.exe
-
Size
292KB
-
MD5
586d4b57347211b4f9e6548478039e38
-
SHA1
1a32e21e3a4e855ce7e1476b4d17be44d3631bbd
-
SHA256
9b586267df3982790217e4656bb750ed72b54704e96eaebeca194bbed21ea2aa
-
SHA512
ee360d2bb596adbaac98e1cfe04fd20a50b1070c29041bae48f8e43bfdbab2dd27bf269a1a846b9bf1167afcba3952afc7bbeb322348503ea1ed01d02ed75476
-
SSDEEP
6144:YMWbrbYq1cxsv3am22UlGHUSwgFJWgg2a8/JMh:fWPEqd3alGHjLoR2d
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4824-136-0x0000000000900000-0x0000000000A68000-memory.dmp warzonerat behavioral2/memory/4824-142-0x0000000000900000-0x0000000000A68000-memory.dmp warzonerat behavioral2/memory/4824-150-0x0000000000900000-0x0000000000A68000-memory.dmp warzonerat -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
586d4b57347211b4f9e6548478039e38.exedescription pid process target process PID 4636 set thread context of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 484 4824 WerFault.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
586d4b57347211b4f9e6548478039e38.exepid process 4636 586d4b57347211b4f9e6548478039e38.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
586d4b57347211b4f9e6548478039e38.execmd.exedescription pid process target process PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4824 4636 586d4b57347211b4f9e6548478039e38.exe vbc.exe PID 4636 wrote to memory of 4308 4636 586d4b57347211b4f9e6548478039e38.exe cmd.exe PID 4636 wrote to memory of 4308 4636 586d4b57347211b4f9e6548478039e38.exe cmd.exe PID 4636 wrote to memory of 4308 4636 586d4b57347211b4f9e6548478039e38.exe cmd.exe PID 4636 wrote to memory of 3604 4636 586d4b57347211b4f9e6548478039e38.exe cmd.exe PID 4636 wrote to memory of 3604 4636 586d4b57347211b4f9e6548478039e38.exe cmd.exe PID 4636 wrote to memory of 3604 4636 586d4b57347211b4f9e6548478039e38.exe cmd.exe PID 4636 wrote to memory of 4732 4636 586d4b57347211b4f9e6548478039e38.exe cmd.exe PID 4636 wrote to memory of 4732 4636 586d4b57347211b4f9e6548478039e38.exe cmd.exe PID 4636 wrote to memory of 4732 4636 586d4b57347211b4f9e6548478039e38.exe cmd.exe PID 3604 wrote to memory of 4348 3604 cmd.exe schtasks.exe PID 3604 wrote to memory of 4348 3604 cmd.exe schtasks.exe PID 3604 wrote to memory of 4348 3604 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\586d4b57347211b4f9e6548478039e38.exe"C:\Users\Admin\AppData\Local\Temp\586d4b57347211b4f9e6548478039e38.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 5243⤵
- Program crash
PID:484
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon"2⤵PID:4308
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon\Windows Security Notification Icon.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon\Windows Security Notification Icon.exe'" /f3⤵
- Creates scheduled task(s)
PID:4348
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\586d4b57347211b4f9e6548478039e38.exe" "C:\Users\Admin\AppData\Roaming\Windows Security Notification Icon\Windows Security Notification Icon.exe"2⤵PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4824 -ip 48241⤵PID:5072