Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 08:16

General

  • Target

    acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe

  • Size

    229KB

  • MD5

    629899cb8c761469ff1de32fd8e8e491

  • SHA1

    6a028323d0aa6c7ae8fbc198ded8594dae179c48

  • SHA256

    acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31

  • SHA512

    3bee357fb65d9a8ae3c5d268f4fb8d7ca2ec5546592225b707dcf203a2fef0abacd77f1c86555786e6554b87a1a4b5203a2be5bc7f7b1dca90daf68b72232a83

  • SSDEEP

    3072:AtD6jSm0uWRfCogTjVEGv+95IVp53D7+fQ1s+4DCS2Y2bA78bL92OH/:At1m0u65mEq+95OQQ+rCdY2b86My

Malware Config

Extracted

Family

warzonerat

C2

21421412515215.duckdns.org:8808

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe
    "C:\Users\Admin\AppData\Local\Temp\acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\ProgramData\images.exe
      "C:\ProgramData\images.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe"
        3⤵
          PID:648

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\images.exe
      Filesize

      229KB

      MD5

      629899cb8c761469ff1de32fd8e8e491

      SHA1

      6a028323d0aa6c7ae8fbc198ded8594dae179c48

      SHA256

      acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31

      SHA512

      3bee357fb65d9a8ae3c5d268f4fb8d7ca2ec5546592225b707dcf203a2fef0abacd77f1c86555786e6554b87a1a4b5203a2be5bc7f7b1dca90daf68b72232a83

    • C:\ProgramData\images.exe
      Filesize

      229KB

      MD5

      629899cb8c761469ff1de32fd8e8e491

      SHA1

      6a028323d0aa6c7ae8fbc198ded8594dae179c48

      SHA256

      acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31

      SHA512

      3bee357fb65d9a8ae3c5d268f4fb8d7ca2ec5546592225b707dcf203a2fef0abacd77f1c86555786e6554b87a1a4b5203a2be5bc7f7b1dca90daf68b72232a83

    • \ProgramData\images.exe
      Filesize

      229KB

      MD5

      629899cb8c761469ff1de32fd8e8e491

      SHA1

      6a028323d0aa6c7ae8fbc198ded8594dae179c48

      SHA256

      acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31

      SHA512

      3bee357fb65d9a8ae3c5d268f4fb8d7ca2ec5546592225b707dcf203a2fef0abacd77f1c86555786e6554b87a1a4b5203a2be5bc7f7b1dca90daf68b72232a83

    • \ProgramData\images.exe
      Filesize

      229KB

      MD5

      629899cb8c761469ff1de32fd8e8e491

      SHA1

      6a028323d0aa6c7ae8fbc198ded8594dae179c48

      SHA256

      acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31

      SHA512

      3bee357fb65d9a8ae3c5d268f4fb8d7ca2ec5546592225b707dcf203a2fef0abacd77f1c86555786e6554b87a1a4b5203a2be5bc7f7b1dca90daf68b72232a83

    • memory/648-60-0x0000000000000000-mapping.dmp
    • memory/648-61-0x00000000001A0000-0x00000000001A1000-memory.dmp
      Filesize

      4KB

    • memory/1104-54-0x0000000075BB1000-0x0000000075BB3000-memory.dmp
      Filesize

      8KB

    • memory/1732-57-0x0000000000000000-mapping.dmp