Analysis
-
max time kernel
197s -
max time network
250s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 07:50
Static task
static1
Behavioral task
behavioral1
Sample
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe
Resource
win10v2004-20220812-en
General
-
Target
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe
-
Size
216KB
-
MD5
4eac968a4fcd0e6bad79ca6eecbd08d8
-
SHA1
a1f8bc409f3d0df06094a5e389bf71be24f4b855
-
SHA256
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31
-
SHA512
380b7f4519feab142495ef84f0260c1d29370acf641990df81184fdfb918070a86e8e0e62b99704ce2b0faf7ccd6cfc0eb7678288d914e351ea00eb486c8aa98
-
SSDEEP
6144:HKcOrIV4ILN3t1cNCUUUx/9ygRC6LcuD:HKcOrIV753t1cso/XUC
Malware Config
Extracted
warzonerat
danbochie.dynv6.net:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1100-57-0x0000000000250000-0x000000000026A000-memory.dmp warzonerat behavioral1/memory/1100-59-0x0000000000400000-0x0000000000593000-memory.dmp warzonerat behavioral1/memory/1100-65-0x0000000000250000-0x000000000026A000-memory.dmp warzonerat behavioral1/memory/1100-66-0x0000000000400000-0x0000000000593000-memory.dmp warzonerat behavioral1/memory/656-70-0x0000000000400000-0x0000000000593000-memory.dmp warzonerat behavioral1/memory/656-75-0x0000000000400000-0x0000000000593000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
stages.exepid process 656 stages.exe -
Loads dropped DLL 2 IoCs
Processes:
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exepid process 1100 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe 1100 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\stages = "C:\\ProgramData\\stages.exe" 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exestages.exedescription pid process target process PID 1100 wrote to memory of 656 1100 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe stages.exe PID 1100 wrote to memory of 656 1100 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe stages.exe PID 1100 wrote to memory of 656 1100 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe stages.exe PID 1100 wrote to memory of 656 1100 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe stages.exe PID 656 wrote to memory of 1168 656 stages.exe cmd.exe PID 656 wrote to memory of 1168 656 stages.exe cmd.exe PID 656 wrote to memory of 1168 656 stages.exe cmd.exe PID 656 wrote to memory of 1168 656 stages.exe cmd.exe PID 656 wrote to memory of 1168 656 stages.exe cmd.exe PID 656 wrote to memory of 1168 656 stages.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe"C:\Users\Admin\AppData\Local\Temp\5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\ProgramData\stages.exe"C:\ProgramData\stages.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1168
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD54eac968a4fcd0e6bad79ca6eecbd08d8
SHA1a1f8bc409f3d0df06094a5e389bf71be24f4b855
SHA2565d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31
SHA512380b7f4519feab142495ef84f0260c1d29370acf641990df81184fdfb918070a86e8e0e62b99704ce2b0faf7ccd6cfc0eb7678288d914e351ea00eb486c8aa98
-
Filesize
216KB
MD54eac968a4fcd0e6bad79ca6eecbd08d8
SHA1a1f8bc409f3d0df06094a5e389bf71be24f4b855
SHA2565d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31
SHA512380b7f4519feab142495ef84f0260c1d29370acf641990df81184fdfb918070a86e8e0e62b99704ce2b0faf7ccd6cfc0eb7678288d914e351ea00eb486c8aa98
-
Filesize
216KB
MD54eac968a4fcd0e6bad79ca6eecbd08d8
SHA1a1f8bc409f3d0df06094a5e389bf71be24f4b855
SHA2565d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31
SHA512380b7f4519feab142495ef84f0260c1d29370acf641990df81184fdfb918070a86e8e0e62b99704ce2b0faf7ccd6cfc0eb7678288d914e351ea00eb486c8aa98
-
Filesize
216KB
MD54eac968a4fcd0e6bad79ca6eecbd08d8
SHA1a1f8bc409f3d0df06094a5e389bf71be24f4b855
SHA2565d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31
SHA512380b7f4519feab142495ef84f0260c1d29370acf641990df81184fdfb918070a86e8e0e62b99704ce2b0faf7ccd6cfc0eb7678288d914e351ea00eb486c8aa98