Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 19:25
Behavioral task
behavioral1
Sample
58f983d8647b0ea9e6f71bd1736a983d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
58f983d8647b0ea9e6f71bd1736a983d.exe
Resource
win10v2004-20220812-en
General
-
Target
58f983d8647b0ea9e6f71bd1736a983d.exe
-
Size
98KB
-
MD5
58f983d8647b0ea9e6f71bd1736a983d
-
SHA1
6e6285384012ae45de920c7156731f2a1ff63545
-
SHA256
3d3d4c7153e535faa3e9933521d5072dfdaf15aef32743961df4d030fcd86105
-
SHA512
4df48ed590ccd10e4b9c188604ccb6d116438fb83cb3abe5a7746ee2e5e97cd8003f2206d48d551cf220336cfe5c72f0451d246560a0079c1216b7deac03669e
-
SSDEEP
1536:5Csejmb+6BQyusX1UjtA0uWRf/eloc/9T1jVEyp:AtD6jSm0uWRfCogTjVEG
Malware Config
Extracted
warzonerat
4.tcp.eu.ngrok.io:18570
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
Processes:
resource yara_rule \ProgramData\images.exe warzonerat \ProgramData\images.exe warzonerat C:\ProgramData\images.exe warzonerat C:\ProgramData\images.exe warzonerat -
Executes dropped EXE 1 IoCs
Processes:
images.exepid process 1116 images.exe -
Loads dropped DLL 2 IoCs
Processes:
58f983d8647b0ea9e6f71bd1736a983d.exepid process 1480 58f983d8647b0ea9e6f71bd1736a983d.exe 1480 58f983d8647b0ea9e6f71bd1736a983d.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
58f983d8647b0ea9e6f71bd1736a983d.exeimages.exedescription pid process target process PID 1480 wrote to memory of 1116 1480 58f983d8647b0ea9e6f71bd1736a983d.exe images.exe PID 1480 wrote to memory of 1116 1480 58f983d8647b0ea9e6f71bd1736a983d.exe images.exe PID 1480 wrote to memory of 1116 1480 58f983d8647b0ea9e6f71bd1736a983d.exe images.exe PID 1480 wrote to memory of 1116 1480 58f983d8647b0ea9e6f71bd1736a983d.exe images.exe PID 1116 wrote to memory of 320 1116 images.exe cmd.exe PID 1116 wrote to memory of 320 1116 images.exe cmd.exe PID 1116 wrote to memory of 320 1116 images.exe cmd.exe PID 1116 wrote to memory of 320 1116 images.exe cmd.exe PID 1116 wrote to memory of 320 1116 images.exe cmd.exe PID 1116 wrote to memory of 320 1116 images.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58f983d8647b0ea9e6f71bd1736a983d.exe"C:\Users\Admin\AppData\Local\Temp\58f983d8647b0ea9e6f71bd1736a983d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\images.exeFilesize
98KB
MD558f983d8647b0ea9e6f71bd1736a983d
SHA16e6285384012ae45de920c7156731f2a1ff63545
SHA2563d3d4c7153e535faa3e9933521d5072dfdaf15aef32743961df4d030fcd86105
SHA5124df48ed590ccd10e4b9c188604ccb6d116438fb83cb3abe5a7746ee2e5e97cd8003f2206d48d551cf220336cfe5c72f0451d246560a0079c1216b7deac03669e
-
C:\ProgramData\images.exeFilesize
98KB
MD558f983d8647b0ea9e6f71bd1736a983d
SHA16e6285384012ae45de920c7156731f2a1ff63545
SHA2563d3d4c7153e535faa3e9933521d5072dfdaf15aef32743961df4d030fcd86105
SHA5124df48ed590ccd10e4b9c188604ccb6d116438fb83cb3abe5a7746ee2e5e97cd8003f2206d48d551cf220336cfe5c72f0451d246560a0079c1216b7deac03669e
-
\ProgramData\images.exeFilesize
98KB
MD558f983d8647b0ea9e6f71bd1736a983d
SHA16e6285384012ae45de920c7156731f2a1ff63545
SHA2563d3d4c7153e535faa3e9933521d5072dfdaf15aef32743961df4d030fcd86105
SHA5124df48ed590ccd10e4b9c188604ccb6d116438fb83cb3abe5a7746ee2e5e97cd8003f2206d48d551cf220336cfe5c72f0451d246560a0079c1216b7deac03669e
-
\ProgramData\images.exeFilesize
98KB
MD558f983d8647b0ea9e6f71bd1736a983d
SHA16e6285384012ae45de920c7156731f2a1ff63545
SHA2563d3d4c7153e535faa3e9933521d5072dfdaf15aef32743961df4d030fcd86105
SHA5124df48ed590ccd10e4b9c188604ccb6d116438fb83cb3abe5a7746ee2e5e97cd8003f2206d48d551cf220336cfe5c72f0451d246560a0079c1216b7deac03669e
-
memory/320-60-0x0000000000000000-mapping.dmp
-
memory/320-61-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/1116-57-0x0000000000000000-mapping.dmp
-
memory/1480-54-0x00000000758B1000-0x00000000758B3000-memory.dmpFilesize
8KB