Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 09:39
Static task
static1
Behavioral task
behavioral1
Sample
PO.051222.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
PO.051222.exe
Resource
win10v2004-20220812-en
General
-
Target
PO.051222.exe
-
Size
604KB
-
MD5
35f3f9e4d43cd037feadf2d7c81f9d90
-
SHA1
41ac8250a318fcbe930b5f19a8191a24b7bfd1fa
-
SHA256
3677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
-
SHA512
809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
SSDEEP
12288:KPuYd+V6b1momPZeft0UA6aX9h8ktLNxH6EldpAlus6rjv8hcpJePuYd+V6b:KPuYd+V6bIomxit0b9JNxVAyrT8ipJeJ
Malware Config
Extracted
warzonerat
51.178.11.185:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/5004-138-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/5004-140-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/5004-141-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/5004-148-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/2832-167-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/2832-168-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/2832-181-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat -
Executes dropped EXE 3 IoCs
Processes:
1mages.exe1mages.exe11.exepid process 1156 1mages.exe 2832 1mages.exe 2236 11.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\11.exe upx C:\Users\Admin\AppData\Local\Temp\11.exe upx behavioral2/memory/2236-179-0x0000000000AB0000-0x0000000000ADD000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1mages.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 1mages.exe -
Drops startup file 2 IoCs
Processes:
PO.051222.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat PO.051222.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start PO.051222.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
PO.051222.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1mages = "C:\\Users\\Admin\\Documents\\1mages.exe" PO.051222.exe -
Modifies WinLogon 2 TTPs 3 IoCs
Processes:
1mages.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList 1mages.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts 1mages.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\zJFBrsq = "0" 1mages.exe -
Drops file in System32 directory 1 IoCs
Processes:
1mages.exedescription ioc process File created C:\Windows\System32\rfxvmt.dll 1mages.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
PO.051222.exe1mages.exedescription pid process target process PID 4720 set thread context of 5004 4720 PO.051222.exe PO.051222.exe PID 1156 set thread context of 2832 1156 1mages.exe 1mages.exe -
Drops file in Program Files directory 2 IoCs
Processes:
1mages.exedescription ioc process File created C:\Program Files\Microsoft DN1\rdpwrap.ini 1mages.exe File created C:\Program Files\Microsoft DN1\sqlmap.dll 1mages.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
Processes:
PO.051222.exedescription ioc process File created C:\Users\Admin\Documents\Documents:ApplicationData PO.051222.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
PO.051222.exepowershell.exe1mages.exepowershell.exepid process 4720 PO.051222.exe 4720 PO.051222.exe 4720 PO.051222.exe 4720 PO.051222.exe 4720 PO.051222.exe 4720 PO.051222.exe 4720 PO.051222.exe 4000 powershell.exe 4000 powershell.exe 1156 1mages.exe 1156 1mages.exe 1156 1mages.exe 1156 1mages.exe 1156 1mages.exe 1156 1mages.exe 1156 1mages.exe 3364 powershell.exe 3364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
PO.051222.exepowershell.exe1mages.exepowershell.exedescription pid process Token: SeDebugPrivilege 4720 PO.051222.exe Token: SeDebugPrivilege 4000 powershell.exe Token: SeDebugPrivilege 1156 1mages.exe Token: SeDebugPrivilege 3364 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1mages.exepid process 2832 1mages.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
PO.051222.exePO.051222.exe1mages.exe1mages.exe11.exedescription pid process target process PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 4720 wrote to memory of 5004 4720 PO.051222.exe PO.051222.exe PID 5004 wrote to memory of 4000 5004 PO.051222.exe powershell.exe PID 5004 wrote to memory of 4000 5004 PO.051222.exe powershell.exe PID 5004 wrote to memory of 4000 5004 PO.051222.exe powershell.exe PID 5004 wrote to memory of 1156 5004 PO.051222.exe 1mages.exe PID 5004 wrote to memory of 1156 5004 PO.051222.exe 1mages.exe PID 5004 wrote to memory of 1156 5004 PO.051222.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 1156 wrote to memory of 2832 1156 1mages.exe 1mages.exe PID 2832 wrote to memory of 3364 2832 1mages.exe powershell.exe PID 2832 wrote to memory of 3364 2832 1mages.exe powershell.exe PID 2832 wrote to memory of 3364 2832 1mages.exe powershell.exe PID 2832 wrote to memory of 4168 2832 1mages.exe cmd.exe PID 2832 wrote to memory of 4168 2832 1mages.exe cmd.exe PID 2832 wrote to memory of 4168 2832 1mages.exe cmd.exe PID 2832 wrote to memory of 4168 2832 1mages.exe cmd.exe PID 2832 wrote to memory of 4168 2832 1mages.exe cmd.exe PID 2832 wrote to memory of 2236 2832 1mages.exe 11.exe PID 2832 wrote to memory of 2236 2832 1mages.exe 11.exe PID 2832 wrote to memory of 2236 2832 1mages.exe 11.exe PID 2236 wrote to memory of 4184 2236 11.exe netsh.exe PID 2236 wrote to memory of 4184 2236 11.exe netsh.exe PID 2236 wrote to memory of 4184 2236 11.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO.051222.exe"C:\Users\Admin\AppData\Local\Temp\PO.051222.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO.051222.exe"C:\Users\Admin\AppData\Local\Temp\PO.051222.exe"2⤵
- Drops startup file
- Adds Run key to start application
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\1mages.exe"C:\Users\Admin\Documents\1mages.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\1mages.exe"C:\Users\Admin\Documents\1mages.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="3389" dir=in action=allow protocol=TCP localport=33896⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5cacf52f32c6b08541d0aecac3ae22ec6
SHA142e056dcd8f1c104d65a575b76c993b15031c7e0
SHA256b3766ab7789999b1390c857608e6b479085b7078d90dded5737187170e63c24b
SHA512c118ee15c0960d7ca743e9529da383cf9576452b312a8f5eae230061c5feab554d376a4f63ec3d15c514dfe53a61d0c7a67d4a4c8fb07f0dc4b15bcbb7ff01a3
-
C:\Users\Admin\AppData\Local\Temp\11.exeFilesize
70KB
MD5ca96229390a0e6a53e8f2125f2c01114
SHA1a54b1081cf58724f8cb292b4d165dfee2fb1c9f6
SHA2560df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c
SHA512e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef
-
C:\Users\Admin\AppData\Local\Temp\11.exeFilesize
70KB
MD5ca96229390a0e6a53e8f2125f2c01114
SHA1a54b1081cf58724f8cb292b4d165dfee2fb1c9f6
SHA2560df3d05900e7b530f6c2a281d43c47839f2cf2a5d386553c8dc46e463a635a2c
SHA512e93445bce6c8b6f51890309577a0ea9369860d2e6bf8cc0ca708879a77bb176d27c5f559bbdb7deb4b719aee0fc48d9068c293559f7629baf4ec3515898102ef
-
C:\Users\Admin\Documents\1mages.exeFilesize
604KB
MD535f3f9e4d43cd037feadf2d7c81f9d90
SHA141ac8250a318fcbe930b5f19a8191a24b7bfd1fa
SHA2563677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
SHA512809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
C:\Users\Admin\Documents\1mages.exeFilesize
604KB
MD535f3f9e4d43cd037feadf2d7c81f9d90
SHA141ac8250a318fcbe930b5f19a8191a24b7bfd1fa
SHA2563677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
SHA512809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
C:\Users\Admin\Documents\1mages.exeFilesize
604KB
MD535f3f9e4d43cd037feadf2d7c81f9d90
SHA141ac8250a318fcbe930b5f19a8191a24b7bfd1fa
SHA2563677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
SHA512809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
memory/1156-145-0x0000000000000000-mapping.dmp
-
memory/2236-176-0x0000000000000000-mapping.dmp
-
memory/2236-179-0x0000000000AB0000-0x0000000000ADD000-memory.dmpFilesize
180KB
-
memory/2832-175-0x000000000AC80000-0x000000000AE20000-memory.dmpFilesize
1.6MB
-
memory/2832-168-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/2832-181-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/2832-167-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/2832-163-0x0000000000000000-mapping.dmp
-
memory/3364-169-0x0000000000000000-mapping.dmp
-
memory/3364-172-0x0000000070C30000-0x0000000070C7C000-memory.dmpFilesize
304KB
-
memory/4000-144-0x00000000055B0000-0x0000000005BD8000-memory.dmpFilesize
6.2MB
-
memory/4000-159-0x0000000007970000-0x0000000007A06000-memory.dmpFilesize
600KB
-
memory/4000-152-0x0000000005D00000-0x0000000005D1E000-memory.dmpFilesize
120KB
-
memory/4000-153-0x0000000006990000-0x00000000069C2000-memory.dmpFilesize
200KB
-
memory/4000-154-0x0000000070530000-0x000000007057C000-memory.dmpFilesize
304KB
-
memory/4000-155-0x0000000006970000-0x000000000698E000-memory.dmpFilesize
120KB
-
memory/4000-156-0x0000000007D20000-0x000000000839A000-memory.dmpFilesize
6.5MB
-
memory/4000-157-0x0000000006890000-0x00000000068AA000-memory.dmpFilesize
104KB
-
memory/4000-158-0x0000000007760000-0x000000000776A000-memory.dmpFilesize
40KB
-
memory/4000-143-0x0000000004E00000-0x0000000004E36000-memory.dmpFilesize
216KB
-
memory/4000-160-0x0000000007920000-0x000000000792E000-memory.dmpFilesize
56KB
-
memory/4000-161-0x0000000007A30000-0x0000000007A4A000-memory.dmpFilesize
104KB
-
memory/4000-162-0x0000000007A10000-0x0000000007A18000-memory.dmpFilesize
32KB
-
memory/4000-150-0x0000000005D50000-0x0000000005DB6000-memory.dmpFilesize
408KB
-
memory/4000-149-0x0000000005420000-0x0000000005442000-memory.dmpFilesize
136KB
-
memory/4000-151-0x0000000005DC0000-0x0000000005E26000-memory.dmpFilesize
408KB
-
memory/4000-142-0x0000000000000000-mapping.dmp
-
memory/4168-174-0x0000000001020000-0x0000000001021000-memory.dmpFilesize
4KB
-
memory/4168-173-0x0000000000000000-mapping.dmp
-
memory/4184-180-0x0000000000000000-mapping.dmp
-
memory/4720-132-0x0000000000D50000-0x0000000000DEC000-memory.dmpFilesize
624KB
-
memory/4720-136-0x00000000063D0000-0x000000000646C000-memory.dmpFilesize
624KB
-
memory/4720-135-0x0000000005830000-0x000000000583A000-memory.dmpFilesize
40KB
-
memory/4720-134-0x0000000005770000-0x0000000005802000-memory.dmpFilesize
584KB
-
memory/4720-133-0x0000000005E20000-0x00000000063C4000-memory.dmpFilesize
5.6MB
-
memory/5004-141-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/5004-140-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/5004-148-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/5004-138-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/5004-137-0x0000000000000000-mapping.dmp