Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 19:25
Behavioral task
behavioral1
Sample
58f983d8647b0ea9e6f71bd1736a983d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
58f983d8647b0ea9e6f71bd1736a983d.exe
Resource
win10v2004-20220812-en
General
-
Target
58f983d8647b0ea9e6f71bd1736a983d.exe
-
Size
98KB
-
MD5
58f983d8647b0ea9e6f71bd1736a983d
-
SHA1
6e6285384012ae45de920c7156731f2a1ff63545
-
SHA256
3d3d4c7153e535faa3e9933521d5072dfdaf15aef32743961df4d030fcd86105
-
SHA512
4df48ed590ccd10e4b9c188604ccb6d116438fb83cb3abe5a7746ee2e5e97cd8003f2206d48d551cf220336cfe5c72f0451d246560a0079c1216b7deac03669e
-
SSDEEP
1536:5Csejmb+6BQyusX1UjtA0uWRf/eloc/9T1jVEyp:AtD6jSm0uWRfCogTjVEG
Malware Config
Extracted
warzonerat
4.tcp.eu.ngrok.io:18570
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x0007000000014930-55.dat warzonerat behavioral1/files/0x0007000000014930-56.dat warzonerat behavioral1/files/0x0007000000014930-58.dat warzonerat behavioral1/files/0x0007000000014930-62.dat warzonerat -
Executes dropped EXE 1 IoCs
pid Process 1116 images.exe -
Loads dropped DLL 2 IoCs
pid Process 1480 58f983d8647b0ea9e6f71bd1736a983d.exe 1480 58f983d8647b0ea9e6f71bd1736a983d.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1116 1480 58f983d8647b0ea9e6f71bd1736a983d.exe 27 PID 1480 wrote to memory of 1116 1480 58f983d8647b0ea9e6f71bd1736a983d.exe 27 PID 1480 wrote to memory of 1116 1480 58f983d8647b0ea9e6f71bd1736a983d.exe 27 PID 1480 wrote to memory of 1116 1480 58f983d8647b0ea9e6f71bd1736a983d.exe 27 PID 1116 wrote to memory of 320 1116 images.exe 28 PID 1116 wrote to memory of 320 1116 images.exe 28 PID 1116 wrote to memory of 320 1116 images.exe 28 PID 1116 wrote to memory of 320 1116 images.exe 28 PID 1116 wrote to memory of 320 1116 images.exe 28 PID 1116 wrote to memory of 320 1116 images.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\58f983d8647b0ea9e6f71bd1736a983d.exe"C:\Users\Admin\AppData\Local\Temp\58f983d8647b0ea9e6f71bd1736a983d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:320
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD558f983d8647b0ea9e6f71bd1736a983d
SHA16e6285384012ae45de920c7156731f2a1ff63545
SHA2563d3d4c7153e535faa3e9933521d5072dfdaf15aef32743961df4d030fcd86105
SHA5124df48ed590ccd10e4b9c188604ccb6d116438fb83cb3abe5a7746ee2e5e97cd8003f2206d48d551cf220336cfe5c72f0451d246560a0079c1216b7deac03669e
-
Filesize
98KB
MD558f983d8647b0ea9e6f71bd1736a983d
SHA16e6285384012ae45de920c7156731f2a1ff63545
SHA2563d3d4c7153e535faa3e9933521d5072dfdaf15aef32743961df4d030fcd86105
SHA5124df48ed590ccd10e4b9c188604ccb6d116438fb83cb3abe5a7746ee2e5e97cd8003f2206d48d551cf220336cfe5c72f0451d246560a0079c1216b7deac03669e
-
Filesize
98KB
MD558f983d8647b0ea9e6f71bd1736a983d
SHA16e6285384012ae45de920c7156731f2a1ff63545
SHA2563d3d4c7153e535faa3e9933521d5072dfdaf15aef32743961df4d030fcd86105
SHA5124df48ed590ccd10e4b9c188604ccb6d116438fb83cb3abe5a7746ee2e5e97cd8003f2206d48d551cf220336cfe5c72f0451d246560a0079c1216b7deac03669e
-
Filesize
98KB
MD558f983d8647b0ea9e6f71bd1736a983d
SHA16e6285384012ae45de920c7156731f2a1ff63545
SHA2563d3d4c7153e535faa3e9933521d5072dfdaf15aef32743961df4d030fcd86105
SHA5124df48ed590ccd10e4b9c188604ccb6d116438fb83cb3abe5a7746ee2e5e97cd8003f2206d48d551cf220336cfe5c72f0451d246560a0079c1216b7deac03669e