Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 08:16
Behavioral task
behavioral1
Sample
acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe
Resource
win10v2004-20221111-en
General
-
Target
acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe
-
Size
229KB
-
MD5
629899cb8c761469ff1de32fd8e8e491
-
SHA1
6a028323d0aa6c7ae8fbc198ded8594dae179c48
-
SHA256
acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31
-
SHA512
3bee357fb65d9a8ae3c5d268f4fb8d7ca2ec5546592225b707dcf203a2fef0abacd77f1c86555786e6554b87a1a4b5203a2be5bc7f7b1dca90daf68b72232a83
-
SSDEEP
3072:AtD6jSm0uWRfCogTjVEGv+95IVp53D7+fQ1s+4DCS2Y2bA78bL92OH/:At1m0u65mEq+95OQQ+rCdY2b86My
Malware Config
Extracted
warzonerat
21421412515215.duckdns.org:8808
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule \ProgramData\images.exe warzonerat C:\ProgramData\images.exe warzonerat \ProgramData\images.exe warzonerat C:\ProgramData\images.exe warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 1732 images.exe -
Loads dropped DLL 2 IoCs
Processes:
acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exepid process 1104 acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe 1104 acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exeimages.exedescription pid process target process PID 1104 wrote to memory of 1732 1104 acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe images.exe PID 1104 wrote to memory of 1732 1104 acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe images.exe PID 1104 wrote to memory of 1732 1104 acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe images.exe PID 1104 wrote to memory of 1732 1104 acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe images.exe PID 1732 wrote to memory of 648 1732 images.exe cmd.exe PID 1732 wrote to memory of 648 1732 images.exe cmd.exe PID 1732 wrote to memory of 648 1732 images.exe cmd.exe PID 1732 wrote to memory of 648 1732 images.exe cmd.exe PID 1732 wrote to memory of 648 1732 images.exe cmd.exe PID 1732 wrote to memory of 648 1732 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe"C:\Users\Admin\AppData\Local\Temp\acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:648
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5629899cb8c761469ff1de32fd8e8e491
SHA16a028323d0aa6c7ae8fbc198ded8594dae179c48
SHA256acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31
SHA5123bee357fb65d9a8ae3c5d268f4fb8d7ca2ec5546592225b707dcf203a2fef0abacd77f1c86555786e6554b87a1a4b5203a2be5bc7f7b1dca90daf68b72232a83
-
Filesize
229KB
MD5629899cb8c761469ff1de32fd8e8e491
SHA16a028323d0aa6c7ae8fbc198ded8594dae179c48
SHA256acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31
SHA5123bee357fb65d9a8ae3c5d268f4fb8d7ca2ec5546592225b707dcf203a2fef0abacd77f1c86555786e6554b87a1a4b5203a2be5bc7f7b1dca90daf68b72232a83
-
Filesize
229KB
MD5629899cb8c761469ff1de32fd8e8e491
SHA16a028323d0aa6c7ae8fbc198ded8594dae179c48
SHA256acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31
SHA5123bee357fb65d9a8ae3c5d268f4fb8d7ca2ec5546592225b707dcf203a2fef0abacd77f1c86555786e6554b87a1a4b5203a2be5bc7f7b1dca90daf68b72232a83
-
Filesize
229KB
MD5629899cb8c761469ff1de32fd8e8e491
SHA16a028323d0aa6c7ae8fbc198ded8594dae179c48
SHA256acd20b4a4d61ad35bc47851661ebc48e75c276ae50af870a1bb189cb2ed14c31
SHA5123bee357fb65d9a8ae3c5d268f4fb8d7ca2ec5546592225b707dcf203a2fef0abacd77f1c86555786e6554b87a1a4b5203a2be5bc7f7b1dca90daf68b72232a83