Analysis

  • max time kernel
    60s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2023 23:12

General

  • Target

    WARZONE RAT 3.03/Datas/rdpwrap64.dll

  • Size

    150KB

  • MD5

    c4063372afe486d5e9a11c5b68e0524f

  • SHA1

    9f9da8d10f3a2f6f17dffdf45b5b90e094ad30f6

  • SHA256

    fc1f3fc182cef9bcef5192e4fa4569697e27852cbffb7a55ea6118c603ddc420

  • SHA512

    6286914126dd16600797f5741bfa6a56e0ade32913385beed822bf6186f74c53fa607597a30a31868d0e5493524bd4cdea41c54e3fa2fa2cbb9d23366b5661e3

  • SSDEEP

    3072:m3zxbyHM+TstVfFyov7je9LBMMmMJDOvYYVsXDPtD05aw:oMjTiVw2ve9LBMMpJsT+lCa

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\WARZONE RAT 3.03\Datas\rdpwrap64.dll",#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4632

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\rdpwrap.txt

    Filesize

    517B

    MD5

    0943e5fb1b117f2353d07509bd88a252

    SHA1

    8a83ca9cb1fd8b41dece0f6dfe9418df8b566bd1

    SHA256

    87dcb6c60a386ad934ebe53297b51d5c431e4e2e1992fe00477b1b29075a300c

    SHA512

    e8cee10821b015df9bca51c932d2409cc253d4f5329979b56adfb2be36afb96378b4fd7a67bb4ccee04ac3f334166e2fec615f1512945adcf93f923551deb1b7