Analysis
-
max time kernel
144s -
max time network
162s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-12-2022 08:21
Static task
static1
Behavioral task
behavioral1
Sample
613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exe
Resource
win10-20220812-en
General
-
Target
613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exe
-
Size
347KB
-
MD5
773fb681c3115952129dfab8a192b111
-
SHA1
6cad9d1d3f6d3607bc8dcd388c972056c6184dc7
-
SHA256
613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c
-
SHA512
ffcaacf102264a20fed98bee11b15ade13c98062e42f70fc52d73897adb278b6c2f96e3cfce0993d9f94d31bc1914f7ac3c017d30de704f3a002f84b2fb3f3e0
-
SSDEEP
6144:HBnAU1X9Tel6FV4aUR4VC+S7VK85ibLbSu+:WU1+6FV494iJKJfSu+
Malware Config
Extracted
warzonerat
privatexpo.duckdns.org:6513
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3356-251-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/3356-267-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
Processes:
dibdtf.exedibdtf.exepid process 4804 dibdtf.exe 3356 dibdtf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dibdtf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\svkbkv = "C:\\Users\\Admin\\AppData\\Roaming\\mrnlwpcqqnhuk\\qjasx.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dibdtf.exe\" C:\\Users\\Admin\\AppData\\Local" dibdtf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dibdtf.exedescription pid process target process PID 4804 set thread context of 3356 4804 dibdtf.exe dibdtf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
dibdtf.exepid process 4804 dibdtf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
dibdtf.exepid process 3356 dibdtf.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exedibdtf.exedescription pid process target process PID 4740 wrote to memory of 4804 4740 613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exe dibdtf.exe PID 4740 wrote to memory of 4804 4740 613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exe dibdtf.exe PID 4740 wrote to memory of 4804 4740 613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exe dibdtf.exe PID 4804 wrote to memory of 3356 4804 dibdtf.exe dibdtf.exe PID 4804 wrote to memory of 3356 4804 dibdtf.exe dibdtf.exe PID 4804 wrote to memory of 3356 4804 dibdtf.exe dibdtf.exe PID 4804 wrote to memory of 3356 4804 dibdtf.exe dibdtf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exe"C:\Users\Admin\AppData\Local\Temp\613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\dibdtf.exe"C:\Users\Admin\AppData\Local\Temp\dibdtf.exe" C:\Users\Admin\AppData\Local\Temp\dvvabwhzxx.i2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\dibdtf.exe"C:\Users\Admin\AppData\Local\Temp\dibdtf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3356
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50
-
Filesize
7KB
MD535624c6acd0194e2e770e3395b572d3a
SHA14254b904007d09fe30b818cc5598eade268cf733
SHA25655049d092cd835e31d70707dbf7098835bd9ad0c388352e6ca9f7604cd570974
SHA512342f3ce332bf0bf635fc6c0087dd2915aad95a22afd005ae12e79e9d069552e1920180e70b9842e15b53cf77d50280b3e0162d6aa1103a253560aeae17a5a47a
-
Filesize
98KB
MD55dfce1ea3fcdb244cb1fbc3c16f15fe2
SHA191a9a5001b6f44937b861c7c4739290d9d4e7016
SHA256f2ed263a2dc26bcb9fc7c192aa31ef33af78491a2d57384bb5efb06bdff50acc
SHA512421c7ed3909b95f708e1e5b70bba65f1a0f0a7c4ddaa48e68a3c649dd6f59622b8ec7b4d9ecfabf9aa879582d2c624e779622f57fec852a5a5f26c5c32e9a6b2