Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2023 02:51
Static task
static1
Behavioral task
behavioral1
Sample
00d1ab5309b9fa1fd4a03ee45cf68b7c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
00d1ab5309b9fa1fd4a03ee45cf68b7c.exe
Resource
win10v2004-20230221-en
General
-
Target
00d1ab5309b9fa1fd4a03ee45cf68b7c.exe
-
Size
150KB
-
MD5
00d1ab5309b9fa1fd4a03ee45cf68b7c
-
SHA1
a42e1cbb962f50e08d65bc4720d343da917324ce
-
SHA256
0c79b94bb739d4770b3fc803a83dffeea129db0b293b4ff5ca923fc5597785a4
-
SHA512
53edc178e98e45e8338995f3548aac3107b5da32352a27cdb6d271426fd46e8ca3af0a8b0611dac3a235efd7a19ff92a82577c6be2fcd68cc12ec3614931fc1d
-
SSDEEP
3072:3fY/TU9fE9PEtu6xbXI5XYXsjQeNYGGzzfbe1IKKbpSjfxCcY4e/75XBhsFJzb78:vYa6cIYXsjQeNYGGnbelcpOxCcLS9xhD
Malware Config
Extracted
warzonerat
healings.duckdns.org:7722
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2044-63-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/2044-65-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/2044-66-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat behavioral1/memory/2044-67-0x0000000000400000-0x000000000041D000-memory.dmp warzonerat -
Loads dropped DLL 1 IoCs
pid Process 1720 00d1ab5309b9fa1fd4a03ee45cf68b7c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\xtdmirbwgcluqa = "C:\\Users\\Admin\\AppData\\Roaming\\ktdyienw\\sclhmmvfajso.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\00d1ab5309b9fa1fd4a03ee45cf68b7c.exe\"" 00d1ab5309b9fa1fd4a03ee45cf68b7c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 2044 1720 00d1ab5309b9fa1fd4a03ee45cf68b7c.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1720 00d1ab5309b9fa1fd4a03ee45cf68b7c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2044 00d1ab5309b9fa1fd4a03ee45cf68b7c.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2044 1720 00d1ab5309b9fa1fd4a03ee45cf68b7c.exe 28 PID 1720 wrote to memory of 2044 1720 00d1ab5309b9fa1fd4a03ee45cf68b7c.exe 28 PID 1720 wrote to memory of 2044 1720 00d1ab5309b9fa1fd4a03ee45cf68b7c.exe 28 PID 1720 wrote to memory of 2044 1720 00d1ab5309b9fa1fd4a03ee45cf68b7c.exe 28 PID 1720 wrote to memory of 2044 1720 00d1ab5309b9fa1fd4a03ee45cf68b7c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\00d1ab5309b9fa1fd4a03ee45cf68b7c.exe"C:\Users\Admin\AppData\Local\Temp\00d1ab5309b9fa1fd4a03ee45cf68b7c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\00d1ab5309b9fa1fd4a03ee45cf68b7c.exe"C:\Users\Admin\AppData\Local\Temp\00d1ab5309b9fa1fd4a03ee45cf68b7c.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD500967f769ee377f027bb48733a19a3a8
SHA12cda5fcec2df7e41ff668b0dc41df285940de5c7
SHA2560c2e7f4e19b7a5254ae364b18dd803a3d46b3678fd93740dbd7fdfbf421028a0
SHA512c99ac18a0e00c82ffa1469bcd67aa0d36122d7feaf10942c1b78ca96640a0ab1beb95651a1f79108199616312bf1d7119cbcbf6af9a08ae09c277c02f9d32876