Analysis

  • max time kernel
    154s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2023 02:18

General

  • Target

    969af9f6016a316693a0d710460a4b6576185a2907c999985f2642ef26889584.exe

  • Size

    718KB

  • MD5

    eae3bd76ec42b738462cb746206550bc

  • SHA1

    8f071fc96b3f464cd1fa1c63624c4e62270e22dc

  • SHA256

    969af9f6016a316693a0d710460a4b6576185a2907c999985f2642ef26889584

  • SHA512

    990a88710a4484bcc6b0c121a2089de282298d6f7bee46d2676a19658bc9ce1d5fd2fee3112aa7db2553ed39ddc80d1a28800665a2270462ea2316666d28c65f

  • SSDEEP

    12288:v5l9W77bOltPah+3EwFE4303gWWAAT6JlK0Xh:vHcOAIy2T6FXh

Malware Config

Extracted

Family

warzonerat

C2

nightmare4666.ddns.net:3443

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • ModiLoader Second Stage 1 IoCs
  • Warzone RAT payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\969af9f6016a316693a0d710460a4b6576185a2907c999985f2642ef26889584.exe
    "C:\Users\Admin\AppData\Local\Temp\969af9f6016a316693a0d710460a4b6576185a2907c999985f2642ef26889584.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Users\Public\Libraries\tkghmwvN.pif
      C:\Users\Public\Libraries\tkghmwvN.pif
      2⤵
      • Executes dropped EXE
      PID:3468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Libraries\tkghmwvN.pif

    Filesize

    171KB

    MD5

    22331abcc9472cc9dc6f37faf333aa2c

    SHA1

    2a001c30ba79a19ceaf6a09c3567c70311760aa4

    SHA256

    bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

    SHA512

    c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

  • C:\Users\Public\Libraries\tkghmwvN.pif

    Filesize

    171KB

    MD5

    22331abcc9472cc9dc6f37faf333aa2c

    SHA1

    2a001c30ba79a19ceaf6a09c3567c70311760aa4

    SHA256

    bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c

    SHA512

    c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c

  • memory/3404-133-0x0000000002260000-0x0000000002261000-memory.dmp

    Filesize

    4KB

  • memory/3404-134-0x00000000022A0000-0x00000000022CC000-memory.dmp

    Filesize

    176KB

  • memory/3404-136-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3468-147-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/3468-152-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/3468-153-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/3468-154-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB

  • memory/3468-155-0x0000000000400000-0x0000000000568000-memory.dmp

    Filesize

    1.4MB