Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03/03/2023, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
0144ace487120c3c08fa6a24b0ece3c9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0144ace487120c3c08fa6a24b0ece3c9.exe
Resource
win10v2004-20230221-en
General
-
Target
0144ace487120c3c08fa6a24b0ece3c9.exe
-
Size
797KB
-
MD5
0144ace487120c3c08fa6a24b0ece3c9
-
SHA1
289ac160d0c978b1ee898ca5a7da11225236d388
-
SHA256
0ffeab62900e5c6a8ad0758cb88fb684798df3d14dc76563cff8fc41687ad659
-
SHA512
d5eef02c64db4a4cdec829e52de2865d4e2a74413790fab58355a4902499664a070929ab4a7265c77f845045fc02d865ec26175a1f55d7cf47d0082367aad6b9
-
SSDEEP
24576:tiSuYTsIBMNjnNNOhAe/S0L4JpctxmwwQVxDphOqy5nC:0HJiKqThOP5
Malware Config
Extracted
warzonerat
79.134.225.88:5555
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 12 IoCs
resource yara_rule behavioral1/memory/1212-63-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1212-64-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1212-65-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1212-66-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1212-68-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1212-70-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1212-71-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1212-78-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1476-93-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1476-94-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1476-99-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/1476-100-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
pid Process 1064 images.exe 1476 images.exe -
Loads dropped DLL 1 IoCs
pid Process 1212 0144ace487120c3c08fa6a24b0ece3c9.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 images.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 images.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" 0144ace487120c3c08fa6a24b0ece3c9.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2012 set thread context of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 1064 set thread context of 1476 1064 images.exe 29 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1476 images.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 2012 wrote to memory of 1212 2012 0144ace487120c3c08fa6a24b0ece3c9.exe 27 PID 1212 wrote to memory of 1064 1212 0144ace487120c3c08fa6a24b0ece3c9.exe 28 PID 1212 wrote to memory of 1064 1212 0144ace487120c3c08fa6a24b0ece3c9.exe 28 PID 1212 wrote to memory of 1064 1212 0144ace487120c3c08fa6a24b0ece3c9.exe 28 PID 1212 wrote to memory of 1064 1212 0144ace487120c3c08fa6a24b0ece3c9.exe 28 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1064 wrote to memory of 1476 1064 images.exe 29 PID 1476 wrote to memory of 1048 1476 images.exe 30 PID 1476 wrote to memory of 1048 1476 images.exe 30 PID 1476 wrote to memory of 1048 1476 images.exe 30 PID 1476 wrote to memory of 1048 1476 images.exe 30 PID 1476 wrote to memory of 1048 1476 images.exe 30 PID 1476 wrote to memory of 1048 1476 images.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 images.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 images.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0144ace487120c3c08fa6a24b0ece3c9.exe"C:\Users\Admin\AppData\Local\Temp\0144ace487120c3c08fa6a24b0ece3c9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\0144ace487120c3c08fa6a24b0ece3c9.exe"{path}"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\ProgramData\images.exe"C:\ProgramData\images.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\ProgramData\images.exe"{path}"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"5⤵PID:1048
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
797KB
MD50144ace487120c3c08fa6a24b0ece3c9
SHA1289ac160d0c978b1ee898ca5a7da11225236d388
SHA2560ffeab62900e5c6a8ad0758cb88fb684798df3d14dc76563cff8fc41687ad659
SHA512d5eef02c64db4a4cdec829e52de2865d4e2a74413790fab58355a4902499664a070929ab4a7265c77f845045fc02d865ec26175a1f55d7cf47d0082367aad6b9
-
Filesize
797KB
MD50144ace487120c3c08fa6a24b0ece3c9
SHA1289ac160d0c978b1ee898ca5a7da11225236d388
SHA2560ffeab62900e5c6a8ad0758cb88fb684798df3d14dc76563cff8fc41687ad659
SHA512d5eef02c64db4a4cdec829e52de2865d4e2a74413790fab58355a4902499664a070929ab4a7265c77f845045fc02d865ec26175a1f55d7cf47d0082367aad6b9
-
Filesize
797KB
MD50144ace487120c3c08fa6a24b0ece3c9
SHA1289ac160d0c978b1ee898ca5a7da11225236d388
SHA2560ffeab62900e5c6a8ad0758cb88fb684798df3d14dc76563cff8fc41687ad659
SHA512d5eef02c64db4a4cdec829e52de2865d4e2a74413790fab58355a4902499664a070929ab4a7265c77f845045fc02d865ec26175a1f55d7cf47d0082367aad6b9
-
Filesize
797KB
MD50144ace487120c3c08fa6a24b0ece3c9
SHA1289ac160d0c978b1ee898ca5a7da11225236d388
SHA2560ffeab62900e5c6a8ad0758cb88fb684798df3d14dc76563cff8fc41687ad659
SHA512d5eef02c64db4a4cdec829e52de2865d4e2a74413790fab58355a4902499664a070929ab4a7265c77f845045fc02d865ec26175a1f55d7cf47d0082367aad6b9