Analysis
-
max time kernel
91s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2023, 06:18
Behavioral task
behavioral1
Sample
d3ff54b73d0987b740b8c94d6c7d67c3dccc9983f126c574d4184b1788aeaf19.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d3ff54b73d0987b740b8c94d6c7d67c3dccc9983f126c574d4184b1788aeaf19.exe
Resource
win10v2004-20221111-en
General
-
Target
d3ff54b73d0987b740b8c94d6c7d67c3dccc9983f126c574d4184b1788aeaf19.exe
-
Size
603KB
-
MD5
a66bff7ab5c211436c320ada78f5b0f8
-
SHA1
23f2591c836378fae58685600e3ef1a5168494d7
-
SHA256
d3ff54b73d0987b740b8c94d6c7d67c3dccc9983f126c574d4184b1788aeaf19
-
SHA512
b657fd19f7b8eb605963861d0caf75c9511f6944a0f051d9433b1a193a6be98d90938df7498d5e9478f30717efa5b211ad984002731f1cfdacbaf8427a8a7e11
-
SSDEEP
12288:+uhKohUOrOsekKxqTrsrnrn8b8Mw8b8sw8b8Mw8b8sw8Bamhna878baP:FhKBsePcnJ
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
resource yara_rule behavioral2/memory/4804-132-0x00000000009E0000-0x0000000000CC4000-memory.dmp upx behavioral2/memory/4804-133-0x00000000009E0000-0x0000000000CC4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d3ff54b73d0987b740b8c94d6c7d67c3dccc9983f126c574d4184b1788aeaf19.exe" d3ff54b73d0987b740b8c94d6c7d67c3dccc9983f126c574d4184b1788aeaf19.exe