Analysis
-
max time kernel
61s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2022 07:27
Static task
static1
Behavioral task
behavioral1
Sample
mac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
mac.exe
Resource
win10v2004-20221111-en
General
-
Target
mac.exe
-
Size
488KB
-
MD5
d17f096da9df5fd709724e7c3b40abd9
-
SHA1
7caf8c68a6d9a9b8fd5f53d49a8ac4721ee841eb
-
SHA256
c9f4f2be380162c81b4ebe85adf10628a9dbdd318508b3236be41ed3f9dbc615
-
SHA512
ba169bb4af95b299e4720eef9406d7dd5f818b9c99ee5d9fa120db90d2e866ca99f80cdf0a47ab1781efe24ad3186c6e8b8c1887a357178f4a94535f0de39d78
-
SSDEEP
6144:MEa0mVYOrW44rarv+po4zbkFrYhpV7z0DUoqWCxHMyOxZvdO/D6sifs7O+j3DLg3:IJgpVwFUhpV73kCxsyOxZEbhh3PId
Malware Config
Extracted
warzonerat
maulo.duckdns.org:6269
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/672-139-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
Processes:
cobwpg.execobwpg.exepid process 3712 cobwpg.exe 672 cobwpg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cobwpg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vnavyaa = "C:\\Users\\Admin\\AppData\\Roaming\\nmaingruey\\dyrmkwjkyy.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\cobwpg.exe\"" cobwpg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cobwpg.exedescription pid process target process PID 3712 set thread context of 672 3712 cobwpg.exe cobwpg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
cobwpg.exepid process 3712 cobwpg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cobwpg.exepid process 672 cobwpg.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
mac.execobwpg.exedescription pid process target process PID 4912 wrote to memory of 3712 4912 mac.exe cobwpg.exe PID 4912 wrote to memory of 3712 4912 mac.exe cobwpg.exe PID 4912 wrote to memory of 3712 4912 mac.exe cobwpg.exe PID 3712 wrote to memory of 672 3712 cobwpg.exe cobwpg.exe PID 3712 wrote to memory of 672 3712 cobwpg.exe cobwpg.exe PID 3712 wrote to memory of 672 3712 cobwpg.exe cobwpg.exe PID 3712 wrote to memory of 672 3712 cobwpg.exe cobwpg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\mac.exe"C:\Users\Admin\AppData\Local\Temp\mac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\cobwpg.exe"C:\Users\Admin\AppData\Local\Temp\cobwpg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\cobwpg.exe"C:\Users\Admin\AppData\Local\Temp\cobwpg.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:672
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
343KB
MD5f1d6c72ce3b071d0e3c42c37d87de7a4
SHA1df6d3b9d1c7b6f5f1083f9ee4cd931e55a559af8
SHA2562def7ef736bc6f794d2ac349f58f85d405a0eb9d52f7164dd8299f000e804bef
SHA512462a7c7d8dd1ef380d200ea4e8fa0abf955553f28023dc62c4db78f047b2e626e626f99a6e0d046363d8535a8d788dd5302ee3d8446aaf58db248ac4605797cc
-
Filesize
343KB
MD5f1d6c72ce3b071d0e3c42c37d87de7a4
SHA1df6d3b9d1c7b6f5f1083f9ee4cd931e55a559af8
SHA2562def7ef736bc6f794d2ac349f58f85d405a0eb9d52f7164dd8299f000e804bef
SHA512462a7c7d8dd1ef380d200ea4e8fa0abf955553f28023dc62c4db78f047b2e626e626f99a6e0d046363d8535a8d788dd5302ee3d8446aaf58db248ac4605797cc
-
Filesize
343KB
MD5f1d6c72ce3b071d0e3c42c37d87de7a4
SHA1df6d3b9d1c7b6f5f1083f9ee4cd931e55a559af8
SHA2562def7ef736bc6f794d2ac349f58f85d405a0eb9d52f7164dd8299f000e804bef
SHA512462a7c7d8dd1ef380d200ea4e8fa0abf955553f28023dc62c4db78f047b2e626e626f99a6e0d046363d8535a8d788dd5302ee3d8446aaf58db248ac4605797cc
-
Filesize
7KB
MD5f2ae235c6d66bcf60920fff5128e632d
SHA18663e88b4e844bfefeeece0b5c62c11a5a042538
SHA25671c82636991771d7c8a8fcbffcd3f2b318c106401f9b532bdedcd090d9229983
SHA512d2737b91eade490f5defc5931b175db666b21fbf8604d350d8de018b2e9f2609120b764413dbbaaf717768f6fac574b7c1fcda735109d0c4b452c5bef2685f0e
-
Filesize
98KB
MD5c07d48b923d8dcd8a545b5d9366a83a3
SHA18b73e3d2e2de25025b6ef578ca57969221afc3e5
SHA2564c8ab7b2daf114a13af8986db33e96789da07727c5fc8550cb0160959193906b
SHA512489510a20bbe84913f87f91d3b38988a6e7ed30ece2aa068b8bbf228b1d424e42805c50097691b6ad0da3fd013f6bdedc469f1ba0dc7339535bb48974e9626c5