General
-
Target
Scan20237098.doc
-
Size
1.1MB
-
Sample
230130-p4l89sca9y
-
MD5
e5c494ecaf82d57a859336b49e431c5e
-
SHA1
be239c1780cfec568382062adbf2b4111b55eac6
-
SHA256
826f4301cfc33fc7621955053afc57d89fce92cf5a0075081112acf7239f1135
-
SHA512
bdda9ebd8dc483fbc3cf476ecabf2dc81bd73ee18e2c2f97e51b1a4b669508c33a4584171bbf0540cab8f090802f04197c0ec71311c4b787b1379ea81eb68412
-
SSDEEP
6144:Gab6QYdSvtJTRnUuCVT8j8PT0DSmOL5xtoPVzFt1RDAUww:GaOQ/fKuCN8jB+TL5gPVzFHRsUr
Static task
static1
Behavioral task
behavioral1
Sample
Scan20237098.rtf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Scan20237098.rtf
Resource
win10v2004-20221111-en
Malware Config
Extracted
http://128.199.78.169/hh/wui.exe
Targets
-
-
Target
Scan20237098.doc
-
Size
1.1MB
-
MD5
e5c494ecaf82d57a859336b49e431c5e
-
SHA1
be239c1780cfec568382062adbf2b4111b55eac6
-
SHA256
826f4301cfc33fc7621955053afc57d89fce92cf5a0075081112acf7239f1135
-
SHA512
bdda9ebd8dc483fbc3cf476ecabf2dc81bd73ee18e2c2f97e51b1a4b669508c33a4584171bbf0540cab8f090802f04197c0ec71311c4b787b1379ea81eb68412
-
SSDEEP
6144:Gab6QYdSvtJTRnUuCVT8j8PT0DSmOL5xtoPVzFt1RDAUww:GaOQ/fKuCN8jB+TL5gPVzFHRsUr
Score10/10-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-