Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 07:50
Static task
static1
Behavioral task
behavioral1
Sample
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe
Resource
win10v2004-20220812-en
General
-
Target
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe
-
Size
216KB
-
MD5
4eac968a4fcd0e6bad79ca6eecbd08d8
-
SHA1
a1f8bc409f3d0df06094a5e389bf71be24f4b855
-
SHA256
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31
-
SHA512
380b7f4519feab142495ef84f0260c1d29370acf641990df81184fdfb918070a86e8e0e62b99704ce2b0faf7ccd6cfc0eb7678288d914e351ea00eb486c8aa98
-
SSDEEP
6144:HKcOrIV4ILN3t1cNCUUUx/9ygRC6LcuD:HKcOrIV753t1cso/XUC
Malware Config
Extracted
warzonerat
danbochie.dynv6.net:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/4856-133-0x00000000005A0000-0x00000000005BA000-memory.dmp warzonerat behavioral2/memory/4856-134-0x0000000000400000-0x0000000000593000-memory.dmp warzonerat behavioral2/memory/4856-139-0x00000000005A0000-0x00000000005BA000-memory.dmp warzonerat behavioral2/memory/4856-140-0x0000000000400000-0x0000000000593000-memory.dmp warzonerat behavioral2/memory/4772-142-0x0000000000400000-0x0000000000593000-memory.dmp warzonerat behavioral2/memory/4772-145-0x0000000000400000-0x0000000000593000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
stages.exepid process 4772 stages.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\stages = "C:\\ProgramData\\stages.exe" 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2360 4856 WerFault.exe 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exestages.exedescription pid process target process PID 4856 wrote to memory of 4772 4856 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe stages.exe PID 4856 wrote to memory of 4772 4856 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe stages.exe PID 4856 wrote to memory of 4772 4856 5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe stages.exe PID 4772 wrote to memory of 4120 4772 stages.exe cmd.exe PID 4772 wrote to memory of 4120 4772 stages.exe cmd.exe PID 4772 wrote to memory of 4120 4772 stages.exe cmd.exe PID 4772 wrote to memory of 4120 4772 stages.exe cmd.exe PID 4772 wrote to memory of 4120 4772 stages.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe"C:\Users\Admin\AppData\Local\Temp\5d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\ProgramData\stages.exe"C:\ProgramData\stages.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:4120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 8642⤵
- Program crash
PID:2360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4856 -ip 48561⤵PID:4736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD54eac968a4fcd0e6bad79ca6eecbd08d8
SHA1a1f8bc409f3d0df06094a5e389bf71be24f4b855
SHA2565d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31
SHA512380b7f4519feab142495ef84f0260c1d29370acf641990df81184fdfb918070a86e8e0e62b99704ce2b0faf7ccd6cfc0eb7678288d914e351ea00eb486c8aa98
-
Filesize
216KB
MD54eac968a4fcd0e6bad79ca6eecbd08d8
SHA1a1f8bc409f3d0df06094a5e389bf71be24f4b855
SHA2565d5e419a42d86763932c38d996c8e59c0b30e093bddcd5cb2cf09c07635b7a31
SHA512380b7f4519feab142495ef84f0260c1d29370acf641990df81184fdfb918070a86e8e0e62b99704ce2b0faf7ccd6cfc0eb7678288d914e351ea00eb486c8aa98