Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 00:54
Static task
static1
Behavioral task
behavioral1
Sample
f8ba9d5452a2fa864ab9859198adc3c3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f8ba9d5452a2fa864ab9859198adc3c3.exe
Resource
win10v2004-20220901-en
General
-
Target
f8ba9d5452a2fa864ab9859198adc3c3.exe
-
Size
1020KB
-
MD5
f8ba9d5452a2fa864ab9859198adc3c3
-
SHA1
8b1ea66c5df1db1f41b65e228de61f2490474e8a
-
SHA256
08b3142a71983995fa6b5f9f4d8bb3c3be1506f9ca1f0e569e1d0e20ec2bf2f0
-
SHA512
2ba11710c6eca4c68168b36c9de0e7ba3e943b3fd022a378019493b1488da753cb950bd8f4abfa23c3a7d82d1b1ad3df4efc50270174ad45c94afc3e09be77a1
-
SSDEEP
24576:Q12dBx8r0ewCE1fjxWRnTMboTiwAAgEEY4:/dBx8r0vZ5lWRoboTQp
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/4040-143-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral2/memory/4040-146-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral2/memory/4040-150-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral2/memory/4040-155-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral2/memory/4888-174-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral2/memory/4888-176-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat behavioral2/memory/4888-180-0x0000000000400000-0x0000000000568000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
Processes:
images.exeimages.exepid process 476 images.exe 4888 images.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f8ba9d5452a2fa864ab9859198adc3c3.exeimages.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation f8ba9d5452a2fa864ab9859198adc3c3.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation images.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f8ba9d5452a2fa864ab9859198adc3c3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\Users\\Admin\\Documents\\images.exe" f8ba9d5452a2fa864ab9859198adc3c3.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
f8ba9d5452a2fa864ab9859198adc3c3.exeimages.exedescription pid process target process PID 3548 set thread context of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 476 set thread context of 4888 476 images.exe images.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1164 schtasks.exe 1976 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
f8ba9d5452a2fa864ab9859198adc3c3.exepowershell.exepowershell.exepid process 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe 4048 powershell.exe 4048 powershell.exe 308 powershell.exe 308 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
f8ba9d5452a2fa864ab9859198adc3c3.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe Token: SeDebugPrivilege 4048 powershell.exe Token: SeDebugPrivilege 308 powershell.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
f8ba9d5452a2fa864ab9859198adc3c3.exef8ba9d5452a2fa864ab9859198adc3c3.exeimages.exeimages.exedescription pid process target process PID 3548 wrote to memory of 4048 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe powershell.exe PID 3548 wrote to memory of 4048 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe powershell.exe PID 3548 wrote to memory of 4048 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe powershell.exe PID 3548 wrote to memory of 1164 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe schtasks.exe PID 3548 wrote to memory of 1164 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe schtasks.exe PID 3548 wrote to memory of 1164 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe schtasks.exe PID 3548 wrote to memory of 1372 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 1372 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 1372 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 3548 wrote to memory of 4040 3548 f8ba9d5452a2fa864ab9859198adc3c3.exe f8ba9d5452a2fa864ab9859198adc3c3.exe PID 4040 wrote to memory of 476 4040 f8ba9d5452a2fa864ab9859198adc3c3.exe images.exe PID 4040 wrote to memory of 476 4040 f8ba9d5452a2fa864ab9859198adc3c3.exe images.exe PID 4040 wrote to memory of 476 4040 f8ba9d5452a2fa864ab9859198adc3c3.exe images.exe PID 476 wrote to memory of 308 476 images.exe powershell.exe PID 476 wrote to memory of 308 476 images.exe powershell.exe PID 476 wrote to memory of 308 476 images.exe powershell.exe PID 476 wrote to memory of 1976 476 images.exe schtasks.exe PID 476 wrote to memory of 1976 476 images.exe schtasks.exe PID 476 wrote to memory of 1976 476 images.exe schtasks.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 476 wrote to memory of 4888 476 images.exe images.exe PID 4888 wrote to memory of 1932 4888 images.exe cmd.exe PID 4888 wrote to memory of 1932 4888 images.exe cmd.exe PID 4888 wrote to memory of 1932 4888 images.exe cmd.exe PID 4888 wrote to memory of 1932 4888 images.exe cmd.exe PID 4888 wrote to memory of 1932 4888 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe"C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gPCxJeGH.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gPCxJeGH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5C39.tmp"2⤵
- Creates scheduled task(s)
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe"C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe"2⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe"C:\Users\Admin\AppData\Local\Temp\f8ba9d5452a2fa864ab9859198adc3c3.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\Documents\images.exe"C:\Users\Admin\Documents\images.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gPCxJeGH.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:308 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gPCxJeGH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4AE.tmp"4⤵
- Creates scheduled task(s)
PID:1976 -
C:\Users\Admin\Documents\images.exe"C:\Users\Admin\Documents\images.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵PID:1932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD59b4e0f1f444e5527a1a7b4edbc315c08
SHA19e038562751419dd7aeecf3ed68ba3ea1b54014c
SHA2567d87c634776670958c1c182cfa35900dfcdd593c5d2eb2b48430c18ee3666915
SHA51244373b21fe250ca0d6a1422d4813175b2f4d1cdf8acc5d475e2aa390586da082e9911229987666c65c71a85d1634c5c72d82a9f7a059615fe33bab0a6d4d6dad
-
C:\Users\Admin\AppData\Local\Temp\tmp4AE.tmpFilesize
1KB
MD5faa43cf176440f8cfb0a3bc0088e3999
SHA196e1276dc5e31990f48b594f6c641edb9bf26374
SHA2564229573924915927dec9a9e2f964ebdbc687323a82fa2f16f7f74894087fb8d3
SHA51254a9b5329d716ffc2cd14a4b49ee4bd779984238dd5fadfadd3a94a8f217b0a0a2c994fdde7d6de0c1821b50d06ded8fcb4eaef92b5eec5edb1f1ee133013d55
-
C:\Users\Admin\AppData\Local\Temp\tmp5C39.tmpFilesize
1KB
MD5faa43cf176440f8cfb0a3bc0088e3999
SHA196e1276dc5e31990f48b594f6c641edb9bf26374
SHA2564229573924915927dec9a9e2f964ebdbc687323a82fa2f16f7f74894087fb8d3
SHA51254a9b5329d716ffc2cd14a4b49ee4bd779984238dd5fadfadd3a94a8f217b0a0a2c994fdde7d6de0c1821b50d06ded8fcb4eaef92b5eec5edb1f1ee133013d55
-
C:\Users\Admin\Documents\images.exeFilesize
1020KB
MD5f8ba9d5452a2fa864ab9859198adc3c3
SHA18b1ea66c5df1db1f41b65e228de61f2490474e8a
SHA25608b3142a71983995fa6b5f9f4d8bb3c3be1506f9ca1f0e569e1d0e20ec2bf2f0
SHA5122ba11710c6eca4c68168b36c9de0e7ba3e943b3fd022a378019493b1488da753cb950bd8f4abfa23c3a7d82d1b1ad3df4efc50270174ad45c94afc3e09be77a1
-
C:\Users\Admin\Documents\images.exeFilesize
1020KB
MD5f8ba9d5452a2fa864ab9859198adc3c3
SHA18b1ea66c5df1db1f41b65e228de61f2490474e8a
SHA25608b3142a71983995fa6b5f9f4d8bb3c3be1506f9ca1f0e569e1d0e20ec2bf2f0
SHA5122ba11710c6eca4c68168b36c9de0e7ba3e943b3fd022a378019493b1488da753cb950bd8f4abfa23c3a7d82d1b1ad3df4efc50270174ad45c94afc3e09be77a1
-
C:\Users\Admin\Documents\images.exeFilesize
1020KB
MD5f8ba9d5452a2fa864ab9859198adc3c3
SHA18b1ea66c5df1db1f41b65e228de61f2490474e8a
SHA25608b3142a71983995fa6b5f9f4d8bb3c3be1506f9ca1f0e569e1d0e20ec2bf2f0
SHA5122ba11710c6eca4c68168b36c9de0e7ba3e943b3fd022a378019493b1488da753cb950bd8f4abfa23c3a7d82d1b1ad3df4efc50270174ad45c94afc3e09be77a1
-
memory/308-177-0x00000000716C0000-0x000000007170C000-memory.dmpFilesize
304KB
-
memory/308-166-0x0000000000000000-mapping.dmp
-
memory/476-152-0x0000000000000000-mapping.dmp
-
memory/1164-138-0x0000000000000000-mapping.dmp
-
memory/1372-141-0x0000000000000000-mapping.dmp
-
memory/1932-178-0x0000000000000000-mapping.dmp
-
memory/1932-179-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/1976-167-0x0000000000000000-mapping.dmp
-
memory/3548-132-0x0000000000F50000-0x0000000001056000-memory.dmpFilesize
1.0MB
-
memory/3548-136-0x000000000B810000-0x000000000B8AC000-memory.dmpFilesize
624KB
-
memory/3548-135-0x0000000007ED0000-0x0000000007EDA000-memory.dmpFilesize
40KB
-
memory/3548-134-0x0000000007F50000-0x0000000007FE2000-memory.dmpFilesize
584KB
-
memory/3548-133-0x0000000008460000-0x0000000008A04000-memory.dmpFilesize
5.6MB
-
memory/4040-143-0x0000000000400000-0x0000000000568000-memory.dmpFilesize
1.4MB
-
memory/4040-150-0x0000000000400000-0x0000000000568000-memory.dmpFilesize
1.4MB
-
memory/4040-155-0x0000000000400000-0x0000000000568000-memory.dmpFilesize
1.4MB
-
memory/4040-142-0x0000000000000000-mapping.dmp
-
memory/4040-146-0x0000000000400000-0x0000000000568000-memory.dmpFilesize
1.4MB
-
memory/4048-160-0x0000000007850000-0x000000000786A000-memory.dmpFilesize
104KB
-
memory/4048-147-0x0000000005480000-0x00000000054A2000-memory.dmpFilesize
136KB
-
memory/4048-151-0x0000000006560000-0x000000000657E000-memory.dmpFilesize
120KB
-
memory/4048-161-0x00000000078C0000-0x00000000078CA000-memory.dmpFilesize
40KB
-
memory/4048-162-0x0000000007AD0000-0x0000000007B66000-memory.dmpFilesize
600KB
-
memory/4048-163-0x0000000007A90000-0x0000000007A9E000-memory.dmpFilesize
56KB
-
memory/4048-164-0x0000000007B90000-0x0000000007BAA000-memory.dmpFilesize
104KB
-
memory/4048-165-0x0000000007B80000-0x0000000007B88000-memory.dmpFilesize
32KB
-
memory/4048-158-0x0000000006AF0000-0x0000000006B0E000-memory.dmpFilesize
120KB
-
memory/4048-149-0x0000000005DE0000-0x0000000005E46000-memory.dmpFilesize
408KB
-
memory/4048-148-0x0000000005620000-0x0000000005686000-memory.dmpFilesize
408KB
-
memory/4048-159-0x0000000007EA0000-0x000000000851A000-memory.dmpFilesize
6.5MB
-
memory/4048-137-0x0000000000000000-mapping.dmp
-
memory/4048-157-0x00000000712A0000-0x00000000712EC000-memory.dmpFilesize
304KB
-
memory/4048-139-0x0000000002C40000-0x0000000002C76000-memory.dmpFilesize
216KB
-
memory/4048-145-0x00000000057B0000-0x0000000005DD8000-memory.dmpFilesize
6.2MB
-
memory/4048-156-0x0000000006B10000-0x0000000006B42000-memory.dmpFilesize
200KB
-
memory/4888-176-0x0000000000400000-0x0000000000568000-memory.dmpFilesize
1.4MB
-
memory/4888-174-0x0000000000400000-0x0000000000568000-memory.dmpFilesize
1.4MB
-
memory/4888-170-0x0000000000000000-mapping.dmp
-
memory/4888-180-0x0000000000400000-0x0000000000568000-memory.dmpFilesize
1.4MB