Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 20:22
Static task
static1
Behavioral task
behavioral1
Sample
35f3f9e4d43cd037feadf2d7c81f9d90.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
35f3f9e4d43cd037feadf2d7c81f9d90.exe
Resource
win10v2004-20220812-en
General
-
Target
35f3f9e4d43cd037feadf2d7c81f9d90.exe
-
Size
604KB
-
MD5
35f3f9e4d43cd037feadf2d7c81f9d90
-
SHA1
41ac8250a318fcbe930b5f19a8191a24b7bfd1fa
-
SHA256
3677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
-
SHA512
809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
SSDEEP
12288:KPuYd+V6b1momPZeft0UA6aX9h8ktLNxH6EldpAlus6rjv8hcpJePuYd+V6b:KPuYd+V6bIomxit0b9JNxVAyrT8ipJeJ
Malware Config
Extracted
warzonerat
51.178.11.185:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/536-66-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/536-65-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/536-68-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/536-72-0x0000000000406DA4-mapping.dmp warzonerat behavioral1/memory/536-71-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/536-70-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/536-75-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/536-76-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral1/memory/536-85-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat -
Executes dropped EXE 1 IoCs
Processes:
1mages.exepid process 1288 1mages.exe -
Drops startup file 2 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat 35f3f9e4d43cd037feadf2d7c81f9d90.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start 35f3f9e4d43cd037feadf2d7c81f9d90.exe -
Loads dropped DLL 2 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exepid process 536 35f3f9e4d43cd037feadf2d7c81f9d90.exe 536 35f3f9e4d43cd037feadf2d7c81f9d90.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\1mages = "C:\\Users\\Admin\\Documents\\1mages.exe" 35f3f9e4d43cd037feadf2d7c81f9d90.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exedescription pid process target process PID 1740 set thread context of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe -
NTFS ADS 1 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exedescription ioc process File created C:\Users\Admin\Documents\Documents:ApplicationData 35f3f9e4d43cd037feadf2d7c81f9d90.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exepowershell.exe1mages.exepid process 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1880 powershell.exe 1288 1mages.exe 1288 1mages.exe 1288 1mages.exe 1288 1mages.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exepowershell.exe1mages.exedescription pid process Token: SeDebugPrivilege 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe Token: SeDebugPrivilege 1880 powershell.exe Token: SeDebugPrivilege 1288 1mages.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exe35f3f9e4d43cd037feadf2d7c81f9d90.exedescription pid process target process PID 1740 wrote to memory of 1148 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 1148 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 1148 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 1148 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 1740 wrote to memory of 536 1740 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 536 wrote to memory of 1880 536 35f3f9e4d43cd037feadf2d7c81f9d90.exe powershell.exe PID 536 wrote to memory of 1880 536 35f3f9e4d43cd037feadf2d7c81f9d90.exe powershell.exe PID 536 wrote to memory of 1880 536 35f3f9e4d43cd037feadf2d7c81f9d90.exe powershell.exe PID 536 wrote to memory of 1880 536 35f3f9e4d43cd037feadf2d7c81f9d90.exe powershell.exe PID 536 wrote to memory of 1288 536 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1mages.exe PID 536 wrote to memory of 1288 536 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1mages.exe PID 536 wrote to memory of 1288 536 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1mages.exe PID 536 wrote to memory of 1288 536 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1mages.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35f3f9e4d43cd037feadf2d7c81f9d90.exe"C:\Users\Admin\AppData\Local\Temp\35f3f9e4d43cd037feadf2d7c81f9d90.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\35f3f9e4d43cd037feadf2d7c81f9d90.exe"C:\Users\Admin\AppData\Local\Temp\35f3f9e4d43cd037feadf2d7c81f9d90.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\35f3f9e4d43cd037feadf2d7c81f9d90.exe"C:\Users\Admin\AppData\Local\Temp\35f3f9e4d43cd037feadf2d7c81f9d90.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\1mages.exe"C:\Users\Admin\Documents\1mages.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\1mages.exeFilesize
604KB
MD535f3f9e4d43cd037feadf2d7c81f9d90
SHA141ac8250a318fcbe930b5f19a8191a24b7bfd1fa
SHA2563677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
SHA512809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
C:\Users\Admin\Documents\1mages.exeFilesize
604KB
MD535f3f9e4d43cd037feadf2d7c81f9d90
SHA141ac8250a318fcbe930b5f19a8191a24b7bfd1fa
SHA2563677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
SHA512809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
\Users\Admin\Documents\1mages.exeFilesize
604KB
MD535f3f9e4d43cd037feadf2d7c81f9d90
SHA141ac8250a318fcbe930b5f19a8191a24b7bfd1fa
SHA2563677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
SHA512809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
\Users\Admin\Documents\1mages.exeFilesize
604KB
MD535f3f9e4d43cd037feadf2d7c81f9d90
SHA141ac8250a318fcbe930b5f19a8191a24b7bfd1fa
SHA2563677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
SHA512809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
memory/536-72-0x0000000000406DA4-mapping.dmp
-
memory/536-75-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/536-60-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/536-61-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/536-63-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/536-66-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/536-65-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/536-68-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/536-85-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/536-71-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/536-70-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/536-76-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/1288-83-0x0000000000000000-mapping.dmp
-
memory/1288-87-0x0000000000F00000-0x0000000000F9C000-memory.dmpFilesize
624KB
-
memory/1740-59-0x0000000000F60000-0x0000000000F88000-memory.dmpFilesize
160KB
-
memory/1740-58-0x0000000000EC0000-0x0000000000F22000-memory.dmpFilesize
392KB
-
memory/1740-57-0x0000000000480000-0x000000000048E000-memory.dmpFilesize
56KB
-
memory/1740-56-0x0000000000590000-0x00000000005AA000-memory.dmpFilesize
104KB
-
memory/1740-54-0x0000000000FB0000-0x000000000104C000-memory.dmpFilesize
624KB
-
memory/1740-55-0x0000000075931000-0x0000000075933000-memory.dmpFilesize
8KB
-
memory/1880-77-0x0000000000000000-mapping.dmp
-
memory/1880-79-0x0000000072DE0000-0x000000007338B000-memory.dmpFilesize
5.7MB
-
memory/1880-80-0x0000000072DE0000-0x000000007338B000-memory.dmpFilesize
5.7MB