Analysis

  • max time kernel
    144s
  • max time network
    162s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-12-2022 08:21

General

  • Target

    613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exe

  • Size

    347KB

  • MD5

    773fb681c3115952129dfab8a192b111

  • SHA1

    6cad9d1d3f6d3607bc8dcd388c972056c6184dc7

  • SHA256

    613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c

  • SHA512

    ffcaacf102264a20fed98bee11b15ade13c98062e42f70fc52d73897adb278b6c2f96e3cfce0993d9f94d31bc1914f7ac3c017d30de704f3a002f84b2fb3f3e0

  • SSDEEP

    6144:HBnAU1X9Tel6FV4aUR4VC+S7VK85ibLbSu+:WU1+6FV494iJKJfSu+

Malware Config

Extracted

Family

warzonerat

C2

privatexpo.duckdns.org:6513

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exe
    "C:\Users\Admin\AppData\Local\Temp\613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Users\Admin\AppData\Local\Temp\dibdtf.exe
      "C:\Users\Admin\AppData\Local\Temp\dibdtf.exe" C:\Users\Admin\AppData\Local\Temp\dvvabwhzxx.i
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Users\Admin\AppData\Local\Temp\dibdtf.exe
        "C:\Users\Admin\AppData\Local\Temp\dibdtf.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • C:\Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • C:\Users\Admin\AppData\Local\Temp\dibdtf.exe

    Filesize

    12KB

    MD5

    36063c9383803d4b38d2aa4f8ea183d5

    SHA1

    8e7b673b92a8f000ad9ac42241d28e7fb0c91c90

    SHA256

    09989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46

    SHA512

    06d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50

  • C:\Users\Admin\AppData\Local\Temp\dvvabwhzxx.i

    Filesize

    7KB

    MD5

    35624c6acd0194e2e770e3395b572d3a

    SHA1

    4254b904007d09fe30b818cc5598eade268cf733

    SHA256

    55049d092cd835e31d70707dbf7098835bd9ad0c388352e6ca9f7604cd570974

    SHA512

    342f3ce332bf0bf635fc6c0087dd2915aad95a22afd005ae12e79e9d069552e1920180e70b9842e15b53cf77d50280b3e0162d6aa1103a253560aeae17a5a47a

  • C:\Users\Admin\AppData\Local\Temp\obldfly.u

    Filesize

    98KB

    MD5

    5dfce1ea3fcdb244cb1fbc3c16f15fe2

    SHA1

    91a9a5001b6f44937b861c7c4739290d9d4e7016

    SHA256

    f2ed263a2dc26bcb9fc7c192aa31ef33af78491a2d57384bb5efb06bdff50acc

    SHA512

    421c7ed3909b95f708e1e5b70bba65f1a0f0a7c4ddaa48e68a3c649dd6f59622b8ec7b4d9ecfabf9aa879582d2c624e779622f57fec852a5a5f26c5c32e9a6b2

  • memory/3356-201-0x0000000000405738-mapping.dmp

  • memory/3356-267-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3356-251-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/4740-150-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-134-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-123-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-124-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-125-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-155-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-127-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-128-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-129-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-130-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-131-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-132-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-133-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-153-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-135-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-136-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-137-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-139-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-138-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-140-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-145-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-144-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-143-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-141-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-146-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-142-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-148-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-149-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-121-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-151-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-152-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-154-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-126-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-122-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-147-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-156-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-157-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-158-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-118-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-119-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4740-120-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-166-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-181-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-165-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-176-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-168-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-169-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-177-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-171-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-172-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-173-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-184-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-175-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-179-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-170-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-163-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-178-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-180-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-182-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-162-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-161-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-159-0x0000000000000000-mapping.dmp

  • memory/4804-164-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-183-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB

  • memory/4804-174-0x0000000077A40000-0x0000000077BCE000-memory.dmp

    Filesize

    1.6MB