Analysis
-
max time kernel
511s -
max time network
588s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
NetGearRuntime.exe
Resource
win7-20221111-en
6 signatures
600 seconds
Behavioral task
behavioral2
Sample
NetGearRuntime.exe
Resource
win10v2004-20221111-en
5 signatures
600 seconds
General
-
Target
NetGearRuntime.exe
-
Size
734KB
-
MD5
a5eb17cc2f951064c1a36209f68ed21f
-
SHA1
c26d3ad77076b2f73861537a213ec932f7497e49
-
SHA256
dc450bf333dd5533e9f3a919a5412529ba0477e6eee69caf23c9c881814a5bb6
-
SHA512
2b6cb09f3b41be9435f33f1d2c5af9357c86f5608111c293ac8173c240c0807f0e7394e092c75ab106cece47c45c3443a061e8b4d2494606948da91b78ea164f
-
SSDEEP
12288:oaJtu9nYr3WraEZO8Sel4V3FvGMDAzBVafwwT9aZ9rS0uh2cGC:oaeImrNZO8Sels3FvT6afBctuh2jC
Score
10/10
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4368 set thread context of 1000 4368 NetGearRuntime.exe 79 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4368 NetGearRuntime.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4368 wrote to memory of 1000 4368 NetGearRuntime.exe 79 PID 4368 wrote to memory of 1000 4368 NetGearRuntime.exe 79 PID 4368 wrote to memory of 1000 4368 NetGearRuntime.exe 79 PID 4368 wrote to memory of 1000 4368 NetGearRuntime.exe 79 PID 4368 wrote to memory of 1000 4368 NetGearRuntime.exe 79 PID 4368 wrote to memory of 1000 4368 NetGearRuntime.exe 79 PID 4368 wrote to memory of 1000 4368 NetGearRuntime.exe 79 PID 4368 wrote to memory of 1000 4368 NetGearRuntime.exe 79 PID 4368 wrote to memory of 1000 4368 NetGearRuntime.exe 79 PID 4368 wrote to memory of 1000 4368 NetGearRuntime.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\NetGearRuntime.exe"C:\Users\Admin\AppData\Local\Temp\NetGearRuntime.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\NetGearRuntime.exe"C:\Users\Admin\AppData\Local\Temp\NetGearRuntime.exe"2⤵PID:1000
-