Analysis
-
max time kernel
123s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2022 14:20
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
375KB
-
MD5
b39590e4dfa1e1cd65137ea39516f2ab
-
SHA1
5288b6d596ee722f91d433de71a34951834034a2
-
SHA256
04358cf18a40cd84d8228374ba2909c7bddff434c1fa8aa9f90340a8ca8ed677
-
SHA512
deedbf0a960fdce33771971a388a31a02b60bc7d1537d55b6fd02ebfc1ba687ff3346cd68460d80b2b534c053677ffb33fdaa57d21a84e52f717ed112e28842a
-
SSDEEP
6144:9Ea0HdHIKAkhemyJ+NUIusCYwzCziHlLWtDdDVtAt7ASDcWejvXwh+Le/yBHmHA0:kUkbNDusniFithD08SDcXjvSke/y/un
Malware Config
Extracted
warzonerat
maulo.duckdns.org:6269
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2756-139-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral2/memory/2756-140-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
Processes:
jbxarogvjr.exejbxarogvjr.exepid process 3656 jbxarogvjr.exe 2756 jbxarogvjr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
jbxarogvjr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\txhebpkmn = "C:\\Users\\Admin\\AppData\\Roaming\\jjeyhwddvbpjyk\\oytsgghavj.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\jbxarogvjr.exe\"" jbxarogvjr.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
jbxarogvjr.exedescription pid process target process PID 3656 set thread context of 2756 3656 jbxarogvjr.exe jbxarogvjr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
jbxarogvjr.exepid process 3656 jbxarogvjr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
jbxarogvjr.exepid process 2756 jbxarogvjr.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
file.exejbxarogvjr.exedescription pid process target process PID 692 wrote to memory of 3656 692 file.exe jbxarogvjr.exe PID 692 wrote to memory of 3656 692 file.exe jbxarogvjr.exe PID 692 wrote to memory of 3656 692 file.exe jbxarogvjr.exe PID 3656 wrote to memory of 2756 3656 jbxarogvjr.exe jbxarogvjr.exe PID 3656 wrote to memory of 2756 3656 jbxarogvjr.exe jbxarogvjr.exe PID 3656 wrote to memory of 2756 3656 jbxarogvjr.exe jbxarogvjr.exe PID 3656 wrote to memory of 2756 3656 jbxarogvjr.exe jbxarogvjr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\jbxarogvjr.exe"C:\Users\Admin\AppData\Local\Temp\jbxarogvjr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\jbxarogvjr.exe"C:\Users\Admin\AppData\Local\Temp\jbxarogvjr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD53e3197a5c8d9ee9e91c50d914e7e0465
SHA11198b3688fc3952c18d899caf6c18fefc15a92ba
SHA256a5216b0f9b2a6c81ee7fa539ecb9d8b89a847041208bb32e95fcc182d20dbe9c
SHA512c895112d25037203d5bceb38c406e82c26b5a0bd813591b19f851328c71372a41f5726a3e19d8514d34b286c7012b2cc39f52a96520468333b15312b881807bd
-
Filesize
350KB
MD5c690e0238cc85ee4550d98ce8fac77fe
SHA19ba3660dcbfe80d98279dc80f973721d87cf3fda
SHA2562e812c9499e40c249fb7866b022d67b7dcf8544fadf81017b0e593705db56a1e
SHA5124fea612105a33ec95d89279fc5095afcbff34522a2a08ba2ff67bf0dce274f802d2ce9c0839c4b856a85155bdcc1eff50db2890e608044944e9fb3578974ec47
-
Filesize
350KB
MD5c690e0238cc85ee4550d98ce8fac77fe
SHA19ba3660dcbfe80d98279dc80f973721d87cf3fda
SHA2562e812c9499e40c249fb7866b022d67b7dcf8544fadf81017b0e593705db56a1e
SHA5124fea612105a33ec95d89279fc5095afcbff34522a2a08ba2ff67bf0dce274f802d2ce9c0839c4b856a85155bdcc1eff50db2890e608044944e9fb3578974ec47
-
Filesize
350KB
MD5c690e0238cc85ee4550d98ce8fac77fe
SHA19ba3660dcbfe80d98279dc80f973721d87cf3fda
SHA2562e812c9499e40c249fb7866b022d67b7dcf8544fadf81017b0e593705db56a1e
SHA5124fea612105a33ec95d89279fc5095afcbff34522a2a08ba2ff67bf0dce274f802d2ce9c0839c4b856a85155bdcc1eff50db2890e608044944e9fb3578974ec47
-
Filesize
7KB
MD5058b35489ca820e90447ba582dbdd3fa
SHA1be42a91f8a3848bec4afae73c9f65c25fb68c6ea
SHA25614459d302d06528a8f447cd63ebb31dacae4656943ebe75b67d032b030080abd
SHA5129cce193f676e7ac667ff9dcadfe09e788359114370467cd54f5fcdeae7ab5f14d8e24ce495fc158a286e44979afdd431d3887782a2db8fbf82bcf53e221a6a35