Analysis

  • max time kernel
    175s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 14:22

General

  • Target

    33cfde0badba18cca2d44476d7d45edc.exe

  • Size

    328KB

  • MD5

    33cfde0badba18cca2d44476d7d45edc

  • SHA1

    290003e3266acffa2e669e50ff0aad8f3974b214

  • SHA256

    3650e941f589db93a518d602e4b0ddd9a54c7c42f3d1d06bdda467651cbb95f7

  • SHA512

    9ee920f4b040d54b48bd80bf1cf29a9ce8572fbf75c737f55fdf8fc7127b63d900e3690af85124b40593e1a30142bce7235c8df025c7e1ec71f97e8cf4478dc5

  • SSDEEP

    6144:PBnxm/hZudIIuLpZPP5ZW757lLRmNAIOVn:LzdIZpZPcVmNPG

Malware Config

Extracted

Family

warzonerat

C2

baramac.duckdns.org:6269

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33cfde0badba18cca2d44476d7d45edc.exe
    "C:\Users\Admin\AppData\Local\Temp\33cfde0badba18cca2d44476d7d45edc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe
      "C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe" C:\Users\Admin\AppData\Local\Temp\rrchmtd.ihc
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe
        "C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4832

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\kmxqftqk.qph

          Filesize

          98KB

          MD5

          6c84aab264b84f7b49e3469dadc6fd2e

          SHA1

          b504d78a83fc55921d8696019d1ba3117358e71d

          SHA256

          814b2671e7062d4a1a0de38d9c5bf5dc0195af248397b39e65300993066d99f9

          SHA512

          c7f0a6145160e1692f24fea49340b884636393138114765bdd93f469fb30c131e004527b0205c8549da4c77d16b556900c58e182485ba65b1dcffa2a49948b3a

        • C:\Users\Admin\AppData\Local\Temp\rrchmtd.ihc

          Filesize

          7KB

          MD5

          88c3926cb29745d988b0e794378e4728

          SHA1

          8b58f03f1542aa30878619e52a800037538639cb

          SHA256

          5ef5687c9cfc258ff4283ce3b67eef061bfedb2e7b81f76392a3ffdcc5a061ca

          SHA512

          b3cd557f2ba7325f07ba2004365959d02dbb4b63607b807e652c409876effbe9e4e393d44cf9d9d827ceec21f24f93a72e3fb3926fb07269f751a2a162480fef

        • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe

          Filesize

          13KB

          MD5

          a76eebf673691ad96288a99825e4c5c6

          SHA1

          e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

          SHA256

          266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

          SHA512

          34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

        • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe

          Filesize

          13KB

          MD5

          a76eebf673691ad96288a99825e4c5c6

          SHA1

          e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

          SHA256

          266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

          SHA512

          34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

        • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe

          Filesize

          13KB

          MD5

          a76eebf673691ad96288a99825e4c5c6

          SHA1

          e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

          SHA256

          266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

          SHA512

          34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

        • memory/4832-139-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/4832-140-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB