Behavioral task
behavioral1
Sample
184b5f1341f86bd7e305b56e2732517b689f07a7375ec867b4f04e05b48565bb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
184b5f1341f86bd7e305b56e2732517b689f07a7375ec867b4f04e05b48565bb.exe
Resource
win10v2004-20221111-en
General
-
Target
184b5f1341f86bd7e305b56e2732517b689f07a7375ec867b4f04e05b48565bb.bin
-
Size
96KB
-
MD5
e4cb594b6e3b013aaf9d7dfac44f9f75
-
SHA1
9edb89d13b09285ee6138ebcf543d3bfe979feb6
-
SHA256
184b5f1341f86bd7e305b56e2732517b689f07a7375ec867b4f04e05b48565bb
-
SHA512
fc74af4fc8c26d5954c9ef3c34825c2b38ca4905cf1c4fdfd34af4f240d4d5ac393f0a2e59050e9376071c9f1472f36d39211610a49ab02227fe73ca028598b3
-
SSDEEP
1536:KU8/ODDeHWU9wcie4o0OVJYS/i5Xuk0zp98KDQ:wODe2Fo/VJYY5k0zwKU
Malware Config
Extracted
warzonerat
Realtek Audio:5200
Signatures
-
Warzone RAT payload 1 IoCs
resource yara_rule sample warzonerat -
Warzonerat family
Files
-
184b5f1341f86bd7e305b56e2732517b689f07a7375ec867b4f04e05b48565bb.bin.exe windows
c2ac33820b594dbbf354d8aa48a30ce1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetModuleFileNameW
GetTempPathA
CreateFileA
LockResource
LoadResource
FindResourceW
VirtualAllocEx
CreateProcessW
GetModuleHandleA
HeapAlloc
GetProcessHeap
LoadLibraryA
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapFree
HeapReAlloc
VirtualQuery
TerminateThread
CreateThread
CreateFileW
LoadLibraryW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
ReadFile
FindFirstFileA
GetBinaryTypeW
FindNextFileA
GetFullPathNameA
GetTempPathW
GetPrivateProfileStringW
Sleep
GetCurrentDirectoryW
SetCurrentDirectoryW
LocalFree
GetFileSize
FreeLibrary
WaitForSingleObject
GetCurrentProcess
WriteFile
CreatePipe
PeekNamedPipe
DuplicateHandle
SetEvent
CreateEventA
GetComputerNameW
LoadLibraryExW
FindFirstFileW
FindNextFileW
SetFilePointer
GetLogicalDriveStringsW
DeleteFileW
CopyFileW
GetDriveTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
lstrcmpW
CreateMutexA
ReleaseMutex
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
VirtualProtectEx
CreateProcessA
VirtualProtect
Process32First
Process32Next
GetWindowsDirectoryA
CreateRemoteThread
IsWow64Process
GetTickCount
lstrcpyW
WideCharToMultiByte
lstrcpyA
MultiByteToWideChar
lstrcatA
VirtualFree
WriteProcessMemory
WaitForMultipleObjects
lstrcmpA
lstrlenA
ExpandEnvironmentStringsW
lstrlenW
CloseHandle
lstrcatW
GetLastError
SetLastError
SizeofResource
GetModuleFileNameA
CreateDirectoryW
GlobalAlloc
user32
MessageBoxA
GetKeyState
GetMessageA
DispatchMessageA
CreateWindowExW
CallNextHookEx
GetAsyncKeyState
SetWindowsHookExA
RegisterClassW
GetRawInputData
MapVirtualKeyA
GetForegroundWindow
DefWindowProcA
RegisterRawInputDevices
wsprintfA
ToUnicode
GetKeyNameTextW
PostQuitMessage
GetWindowTextW
GetLastInputInfo
TranslateMessage
wsprintfW
advapi32
FreeSid
LookupAccountSidW
GetTokenInformation
CloseServiceHandle
OpenSCManagerW
RegCreateKeyExA
StartServiceW
EnumServicesStatusExW
QueryServiceConfigW
RegSetValueExA
RegDeleteKeyW
LookupPrivilegeValueW
AdjustTokenPrivileges
AllocateAndInitializeSid
OpenProcessToken
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExA
RegEnumKeyExW
RegQueryValueExA
RegQueryInfoKeyW
OpenServiceW
ChangeServiceConfigW
RegDeleteValueW
shell32
SHGetSpecialFolderPathW
ShellExecuteA
ord680
SHGetFolderPathW
ShellExecuteW
SHCreateDirectoryExW
ShellExecuteExA
urlmon
URLDownloadToFileW
ws2_32
freeaddrinfo
htons
recv
connect
socket
send
WSAStartup
getaddrinfo
shutdown
closesocket
WSACleanup
ioctlsocket
ntohs
gethostbyname
inet_addr
setsockopt
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
shlwapi
StrStrW
PathRemoveFileSpecA
StrStrA
PathCombineA
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
netapi32
NetLocalGroupAddMembers
NetUserAdd
oleaut32
VariantInit
crypt32
CryptStringToBinaryA
CryptUnprotectData
psapi
GetModuleFileNameExW
wininet
InternetQueryDataAvailable
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
InternetReadFile
InternetCheckConnectionW
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ