Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    175s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 14:22

General

  • Target

    33cfde0badba18cca2d44476d7d45edc.exe

  • Size

    328KB

  • MD5

    33cfde0badba18cca2d44476d7d45edc

  • SHA1

    290003e3266acffa2e669e50ff0aad8f3974b214

  • SHA256

    3650e941f589db93a518d602e4b0ddd9a54c7c42f3d1d06bdda467651cbb95f7

  • SHA512

    9ee920f4b040d54b48bd80bf1cf29a9ce8572fbf75c737f55fdf8fc7127b63d900e3690af85124b40593e1a30142bce7235c8df025c7e1ec71f97e8cf4478dc5

  • SSDEEP

    6144:PBnxm/hZudIIuLpZPP5ZW757lLRmNAIOVn:LzdIZpZPcVmNPG

Malware Config

Extracted

Family

warzonerat

C2

baramac.duckdns.org:6269

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33cfde0badba18cca2d44476d7d45edc.exe
    "C:\Users\Admin\AppData\Local\Temp\33cfde0badba18cca2d44476d7d45edc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe
      "C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe" C:\Users\Admin\AppData\Local\Temp\rrchmtd.ihc
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe
        "C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kmxqftqk.qph

    Filesize

    98KB

    MD5

    6c84aab264b84f7b49e3469dadc6fd2e

    SHA1

    b504d78a83fc55921d8696019d1ba3117358e71d

    SHA256

    814b2671e7062d4a1a0de38d9c5bf5dc0195af248397b39e65300993066d99f9

    SHA512

    c7f0a6145160e1692f24fea49340b884636393138114765bdd93f469fb30c131e004527b0205c8549da4c77d16b556900c58e182485ba65b1dcffa2a49948b3a

  • C:\Users\Admin\AppData\Local\Temp\rrchmtd.ihc

    Filesize

    7KB

    MD5

    88c3926cb29745d988b0e794378e4728

    SHA1

    8b58f03f1542aa30878619e52a800037538639cb

    SHA256

    5ef5687c9cfc258ff4283ce3b67eef061bfedb2e7b81f76392a3ffdcc5a061ca

    SHA512

    b3cd557f2ba7325f07ba2004365959d02dbb4b63607b807e652c409876effbe9e4e393d44cf9d9d827ceec21f24f93a72e3fb3926fb07269f751a2a162480fef

  • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe

    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe

    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • C:\Users\Admin\AppData\Local\Temp\xcfoyif.exe

    Filesize

    13KB

    MD5

    a76eebf673691ad96288a99825e4c5c6

    SHA1

    e82d6bd4d1f3b19fe88f0e53f811260fb89fc2c1

    SHA256

    266237fe1dfb6f03610b7c3311d6122963787f64e2a6ef374a7d043921b30f74

    SHA512

    34d0535d4f9a08fa7233e4a1e4e2fbc8e5322f089568fe343e2273f99164cdafc322a08fe8dc0847e48389cf3394292a873147540991b303171aad8189ccd596

  • memory/4832-139-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/4832-140-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB