Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2023, 13:14

General

  • Target

    tmp.exe

  • Size

    132KB

  • MD5

    7e7db52be84969dad2a85c921c784924

  • SHA1

    f6e398feafb8a79d76598e15d6ff93f0b2aa1050

  • SHA256

    f506645bf1fee80214a7c8f45516f23e0c6b066c200da796d8f68dd55258ffe6

  • SHA512

    35b2eb055c7f3e258aca21b2ea7ab337138272e860a69db258d26ef7474bf456ec3040dabcfd9f54bde2b0894f41d4418ffb1f899fd7a90f64ad50116f7283a9

  • SSDEEP

    3072:K7W9jps0Tx4azG6GweOTir5axbjNCz45LT7a:KwpsERzGKurEXCzeLT7a

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
      PID:1684

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads