General
-
Target
Order to Purchase DOC_PO.20051011_060223.ace
-
Size
401KB
-
Sample
230206-m6j6ksgh4w
-
MD5
3de0367d8fd512ec8b4c62e67c6700c0
-
SHA1
39aa9a0ab59f3f93c24aa9c6e3a2b7200271a831
-
SHA256
8bc2a80321c01b51ff4896895730ccda0b34f2a1cacc2bba849b4b208ff197d8
-
SHA512
cfc2a5a692b445e7befa6b295179b416f2ca99b4e44235d359298f7acb418d47a907b037d3e5814da223d083af479ed56dd4209956c00a377961f39972544d0d
-
SSDEEP
12288:YaO/hw4kpKI/6MVAgJTezEyRm0slq+/MP1jcv23:YFwXpV/VVAgJWRshUPhe23
Static task
static1
Behavioral task
behavioral1
Sample
Order to Purchase DOC_PO.20051011_060223.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Order to Purchase DOC_PO.20051011_060223.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
Order to Purchase DOC_PO.20051011_060223.exe
-
Size
573KB
-
MD5
3c9f896424d6c80ff3429e77512c96fe
-
SHA1
1cd10b529b174402c709996d8ecad6b16f76b99e
-
SHA256
83876348a7bd641e0db5efdffda03efa8e7831ad2d6b28cd86cea8e687e4e767
-
SHA512
d5ee679a4a39d4061af2c65b98302fec0f245502cb84c510fb568fca226d40b2773dcc068cd2a13012fd04a61e9336ac8e82e8568b9b872b16f9d58e93385eb7
-
SSDEEP
6144:6CfoCKXgnHyTLQIIZyzukNo1DZh2GWWJz9vlGxE/Ee+bp5I3MGWc04YrDYeHTHya:6CQ5gnHbL8z2hb/jwk+F5IBRKYWTHaQ
Score10/10-
Modifies WinLogon for persistence
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Modifies Windows Firewall
-
Sets DLL path for service in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-