Analysis
-
max time kernel
87s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 11:15
Static task
static1
Behavioral task
behavioral1
Sample
53622e61772d39cd6868b89aaabb8249.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
53622e61772d39cd6868b89aaabb8249.exe
Resource
win10v2004-20230220-en
General
-
Target
53622e61772d39cd6868b89aaabb8249.exe
-
Size
193KB
-
MD5
53622e61772d39cd6868b89aaabb8249
-
SHA1
97d7be3cbfc038c741d0a0ba0404c147eb2d9b1b
-
SHA256
ac48e7fdd258315b54625d2c9cc84d555d44b1a82c4e834238500f32d088d58b
-
SHA512
1e254e3913f2bcd985d96123e8e2f08271f9f1e081a5c39d14afcfc6a1513c76139f980bd25d575845ca85ab2e14881042524a52314321f398558cdb30583d95
-
SSDEEP
6144:QkdnyRSXGwbtZt2hP4hY9eII6cuH58KCNRJynB:Q3SXt5E4hoeEdmV+
Malware Config
Extracted
warzonerat
46.183.222.62:5353
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/2264-137-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral2/memory/2264-140-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral2/memory/2264-141-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral2/memory/2264-146-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral2/memory/3928-155-0x0000000000700000-0x000000000085C000-memory.dmp warzonerat behavioral2/memory/3928-160-0x0000000000700000-0x000000000085C000-memory.dmp warzonerat -
Executes dropped EXE 2 IoCs
Processes:
images.exeimages.exepid process 1076 images.exe 3928 images.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
53622e61772d39cd6868b89aaabb8249.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\Users\\Admin\\Documents\\images.exe" 53622e61772d39cd6868b89aaabb8249.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
53622e61772d39cd6868b89aaabb8249.exeimages.exedescription pid process target process PID 4352 set thread context of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 1076 set thread context of 3928 1076 images.exe images.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4532 3928 WerFault.exe images.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
53622e61772d39cd6868b89aaabb8249.exe53622e61772d39cd6868b89aaabb8249.exeimages.exedescription pid process target process PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 4352 wrote to memory of 2264 4352 53622e61772d39cd6868b89aaabb8249.exe 53622e61772d39cd6868b89aaabb8249.exe PID 2264 wrote to memory of 1076 2264 53622e61772d39cd6868b89aaabb8249.exe images.exe PID 2264 wrote to memory of 1076 2264 53622e61772d39cd6868b89aaabb8249.exe images.exe PID 2264 wrote to memory of 1076 2264 53622e61772d39cd6868b89aaabb8249.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe PID 1076 wrote to memory of 3928 1076 images.exe images.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53622e61772d39cd6868b89aaabb8249.exe"C:\Users\Admin\AppData\Local\Temp\53622e61772d39cd6868b89aaabb8249.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\53622e61772d39cd6868b89aaabb8249.exe"C:\Users\Admin\AppData\Local\Temp\53622e61772d39cd6868b89aaabb8249.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\images.exe"C:\Users\Admin\Documents\images.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\images.exe"C:\Users\Admin\Documents\images.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 5445⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3928 -ip 39281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\images.exeFilesize
193KB
MD553622e61772d39cd6868b89aaabb8249
SHA197d7be3cbfc038c741d0a0ba0404c147eb2d9b1b
SHA256ac48e7fdd258315b54625d2c9cc84d555d44b1a82c4e834238500f32d088d58b
SHA5121e254e3913f2bcd985d96123e8e2f08271f9f1e081a5c39d14afcfc6a1513c76139f980bd25d575845ca85ab2e14881042524a52314321f398558cdb30583d95
-
C:\Users\Admin\Documents\images.exeFilesize
193KB
MD553622e61772d39cd6868b89aaabb8249
SHA197d7be3cbfc038c741d0a0ba0404c147eb2d9b1b
SHA256ac48e7fdd258315b54625d2c9cc84d555d44b1a82c4e834238500f32d088d58b
SHA5121e254e3913f2bcd985d96123e8e2f08271f9f1e081a5c39d14afcfc6a1513c76139f980bd25d575845ca85ab2e14881042524a52314321f398558cdb30583d95
-
C:\Users\Admin\Documents\images.exeFilesize
193KB
MD553622e61772d39cd6868b89aaabb8249
SHA197d7be3cbfc038c741d0a0ba0404c147eb2d9b1b
SHA256ac48e7fdd258315b54625d2c9cc84d555d44b1a82c4e834238500f32d088d58b
SHA5121e254e3913f2bcd985d96123e8e2f08271f9f1e081a5c39d14afcfc6a1513c76139f980bd25d575845ca85ab2e14881042524a52314321f398558cdb30583d95
-
memory/2264-141-0x0000000000400000-0x000000000055C000-memory.dmpFilesize
1.4MB
-
memory/2264-137-0x0000000000400000-0x000000000055C000-memory.dmpFilesize
1.4MB
-
memory/2264-140-0x0000000000400000-0x000000000055C000-memory.dmpFilesize
1.4MB
-
memory/2264-146-0x0000000000400000-0x000000000055C000-memory.dmpFilesize
1.4MB
-
memory/3928-155-0x0000000000700000-0x000000000085C000-memory.dmpFilesize
1.4MB
-
memory/3928-160-0x0000000000700000-0x000000000085C000-memory.dmpFilesize
1.4MB
-
memory/4352-133-0x0000000000DE0000-0x0000000000E16000-memory.dmpFilesize
216KB
-
memory/4352-136-0x0000000005910000-0x0000000005920000-memory.dmpFilesize
64KB
-
memory/4352-135-0x0000000005790000-0x00000000057F6000-memory.dmpFilesize
408KB
-
memory/4352-134-0x0000000005C90000-0x0000000006234000-memory.dmpFilesize
5.6MB