Analysis
-
max time kernel
161s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 20:22
Static task
static1
Behavioral task
behavioral1
Sample
35f3f9e4d43cd037feadf2d7c81f9d90.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
35f3f9e4d43cd037feadf2d7c81f9d90.exe
Resource
win10v2004-20220812-en
General
-
Target
35f3f9e4d43cd037feadf2d7c81f9d90.exe
-
Size
604KB
-
MD5
35f3f9e4d43cd037feadf2d7c81f9d90
-
SHA1
41ac8250a318fcbe930b5f19a8191a24b7bfd1fa
-
SHA256
3677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
-
SHA512
809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
SSDEEP
12288:KPuYd+V6b1momPZeft0UA6aX9h8ktLNxH6EldpAlus6rjv8hcpJePuYd+V6b:KPuYd+V6bIomxit0b9JNxVAyrT8ipJeJ
Malware Config
Extracted
warzonerat
51.178.11.185:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/4792-138-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/4792-140-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/4792-141-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/4792-149-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/4792-153-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/376-168-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/376-169-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat behavioral2/memory/376-177-0x0000000000400000-0x000000000055A000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
Processes:
1mages.exe1mages.exepid process 3388 1mages.exe 376 1mages.exe -
Drops startup file 2 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat 35f3f9e4d43cd037feadf2d7c81f9d90.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start 35f3f9e4d43cd037feadf2d7c81f9d90.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1mages = "C:\\Users\\Admin\\Documents\\1mages.exe" 35f3f9e4d43cd037feadf2d7c81f9d90.exe -
Modifies WinLogon 2 TTPs 3 IoCs
Processes:
1mages.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList 1mages.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts 1mages.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\rBoCxpG = "0" 1mages.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exe1mages.exedescription pid process target process PID 4204 set thread context of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 3388 set thread context of 376 3388 1mages.exe 1mages.exe -
NTFS ADS 1 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exedescription ioc process File created C:\Users\Admin\Documents\Documents:ApplicationData 35f3f9e4d43cd037feadf2d7c81f9d90.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exepowershell.exe1mages.exepowershell.exepid process 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1644 powershell.exe 1644 powershell.exe 3388 1mages.exe 3388 1mages.exe 3388 1mages.exe 3388 1mages.exe 3388 1mages.exe 3388 1mages.exe 3388 1mages.exe 1656 powershell.exe 1656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exepowershell.exe1mages.exepowershell.exedescription pid process Token: SeDebugPrivilege 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 3388 1mages.exe Token: SeDebugPrivilege 1656 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1mages.exepid process 376 1mages.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
35f3f9e4d43cd037feadf2d7c81f9d90.exe35f3f9e4d43cd037feadf2d7c81f9d90.exe1mages.exe1mages.exedescription pid process target process PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4204 wrote to memory of 4792 4204 35f3f9e4d43cd037feadf2d7c81f9d90.exe 35f3f9e4d43cd037feadf2d7c81f9d90.exe PID 4792 wrote to memory of 1644 4792 35f3f9e4d43cd037feadf2d7c81f9d90.exe powershell.exe PID 4792 wrote to memory of 1644 4792 35f3f9e4d43cd037feadf2d7c81f9d90.exe powershell.exe PID 4792 wrote to memory of 1644 4792 35f3f9e4d43cd037feadf2d7c81f9d90.exe powershell.exe PID 4792 wrote to memory of 3388 4792 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1mages.exe PID 4792 wrote to memory of 3388 4792 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1mages.exe PID 4792 wrote to memory of 3388 4792 35f3f9e4d43cd037feadf2d7c81f9d90.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 3388 wrote to memory of 376 3388 1mages.exe 1mages.exe PID 376 wrote to memory of 1656 376 1mages.exe powershell.exe PID 376 wrote to memory of 1656 376 1mages.exe powershell.exe PID 376 wrote to memory of 1656 376 1mages.exe powershell.exe PID 376 wrote to memory of 4420 376 1mages.exe cmd.exe PID 376 wrote to memory of 4420 376 1mages.exe cmd.exe PID 376 wrote to memory of 4420 376 1mages.exe cmd.exe PID 376 wrote to memory of 4420 376 1mages.exe cmd.exe PID 376 wrote to memory of 4420 376 1mages.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35f3f9e4d43cd037feadf2d7c81f9d90.exe"C:\Users\Admin\AppData\Local\Temp\35f3f9e4d43cd037feadf2d7c81f9d90.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\35f3f9e4d43cd037feadf2d7c81f9d90.exe"C:\Users\Admin\AppData\Local\Temp\35f3f9e4d43cd037feadf2d7c81f9d90.exe"2⤵
- Drops startup file
- Adds Run key to start application
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\1mages.exe"C:\Users\Admin\Documents\1mages.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\1mages.exe"C:\Users\Admin\Documents\1mages.exe"4⤵
- Executes dropped EXE
- Modifies WinLogon
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5df332a01af5683df92e6f5317158502e
SHA19a202f7226b020cbecbe85c41f5c775fc0b9cc9b
SHA256bd0d663daacdfbb930cbada251b3430064284b815b8118017efff06fb85d730a
SHA512d666a2af3bd284cd9ced5d444ec5bfc62fb43991c6647f8b903defe2e0de25ccc638d1e69b89eea665b121b89526ec22bac64dd3520ca9d6cd761931ad40beb1
-
C:\Users\Admin\Documents\1mages.exeFilesize
604KB
MD535f3f9e4d43cd037feadf2d7c81f9d90
SHA141ac8250a318fcbe930b5f19a8191a24b7bfd1fa
SHA2563677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
SHA512809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
C:\Users\Admin\Documents\1mages.exeFilesize
604KB
MD535f3f9e4d43cd037feadf2d7c81f9d90
SHA141ac8250a318fcbe930b5f19a8191a24b7bfd1fa
SHA2563677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
SHA512809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
C:\Users\Admin\Documents\1mages.exeFilesize
604KB
MD535f3f9e4d43cd037feadf2d7c81f9d90
SHA141ac8250a318fcbe930b5f19a8191a24b7bfd1fa
SHA2563677ddb0cda755e0cca757a2ea20c794b836877b1ed6bd14e0bcd4dfd721751c
SHA512809b0fb50cd3ed5a844bbd19f7e5bb1ad110164bee31f7852c7c0ad0f052b0c5b8f4ea399d0c6fd9d8253ad087783aded06f4d9e3d33b134dd489d4eb162ddb3
-
memory/376-177-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/376-176-0x000000000AD50000-0x000000000AEF0000-memory.dmpFilesize
1.6MB
-
memory/376-169-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/376-168-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/376-164-0x0000000000000000-mapping.dmp
-
memory/1644-163-0x0000000007A50000-0x0000000007A58000-memory.dmpFilesize
32KB
-
memory/1644-160-0x0000000007990000-0x0000000007A26000-memory.dmpFilesize
600KB
-
memory/1644-145-0x0000000005C20000-0x0000000005C42000-memory.dmpFilesize
136KB
-
memory/1644-146-0x0000000005D40000-0x0000000005DA6000-memory.dmpFilesize
408KB
-
memory/1644-147-0x0000000005DB0000-0x0000000005E16000-memory.dmpFilesize
408KB
-
memory/1644-148-0x0000000006410000-0x000000000642E000-memory.dmpFilesize
120KB
-
memory/1644-162-0x0000000007A70000-0x0000000007A8A000-memory.dmpFilesize
104KB
-
memory/1644-161-0x0000000007960000-0x000000000796E000-memory.dmpFilesize
56KB
-
memory/1644-143-0x0000000002AE0000-0x0000000002B16000-memory.dmpFilesize
216KB
-
memory/1644-142-0x0000000000000000-mapping.dmp
-
memory/1644-144-0x0000000005580000-0x0000000005BA8000-memory.dmpFilesize
6.2MB
-
memory/1644-154-0x00000000069E0000-0x0000000006A12000-memory.dmpFilesize
200KB
-
memory/1644-155-0x00000000708D0000-0x000000007091C000-memory.dmpFilesize
304KB
-
memory/1644-156-0x00000000069C0000-0x00000000069DE000-memory.dmpFilesize
120KB
-
memory/1644-157-0x0000000007D70000-0x00000000083EA000-memory.dmpFilesize
6.5MB
-
memory/1644-158-0x00000000066E0000-0x00000000066FA000-memory.dmpFilesize
104KB
-
memory/1644-159-0x00000000077A0000-0x00000000077AA000-memory.dmpFilesize
40KB
-
memory/1656-170-0x0000000000000000-mapping.dmp
-
memory/1656-173-0x0000000070B00000-0x0000000070B4C000-memory.dmpFilesize
304KB
-
memory/3388-150-0x0000000000000000-mapping.dmp
-
memory/4204-133-0x00000000058F0000-0x0000000005E94000-memory.dmpFilesize
5.6MB
-
memory/4204-132-0x0000000000610000-0x00000000006AC000-memory.dmpFilesize
624KB
-
memory/4204-134-0x0000000005140000-0x00000000051D2000-memory.dmpFilesize
584KB
-
memory/4204-135-0x00000000051F0000-0x00000000051FA000-memory.dmpFilesize
40KB
-
memory/4204-136-0x0000000005FC0000-0x000000000605C000-memory.dmpFilesize
624KB
-
memory/4420-174-0x0000000000000000-mapping.dmp
-
memory/4420-175-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/4792-137-0x0000000000000000-mapping.dmp
-
memory/4792-138-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/4792-140-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/4792-153-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/4792-141-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB
-
memory/4792-149-0x0000000000400000-0x000000000055A000-memory.dmpFilesize
1.4MB