Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
03344799.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
03344799.exe
Resource
win10v2004-20230220-en
General
-
Target
03344799.exe
-
Size
26KB
-
MD5
f97dd898670874b524df23d89dc6a12f
-
SHA1
98b76fd8b13e66e73215fc6f1f3b1d510d0d504d
-
SHA256
841fc466a01841b07d66a4e99f2695592f9fc02c7bd24e5f3d74259a345d5110
-
SHA512
0e82501494b30e88b82ee0291e56b132a0615800d4bce3a031f06a34b7b0e9ef9a89c18648e9b4c70be460089f429b6052b5aac306ad979278e276a3c1308515
-
SSDEEP
384:/T1sZrG2iPQWRErIYib+W42KKxPxh8E9VF0Ny5dF:/BsZa2mf+UYib+WnxPxWEj
Malware Config
Extracted
warzonerat
testing1212.ddns.net:5201
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral2/memory/4848-182-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral2/memory/4848-190-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation 03344799.exe -
Executes dropped EXE 1 IoCs
pid Process 2148 Play.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2148 set thread context of 4848 2148 Play.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5072 2148 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5076 powershell.exe 5076 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5076 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1340 03344799.exe 2148 Play.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1340 wrote to memory of 5076 1340 03344799.exe 83 PID 1340 wrote to memory of 5076 1340 03344799.exe 83 PID 1340 wrote to memory of 5076 1340 03344799.exe 83 PID 1340 wrote to memory of 2148 1340 03344799.exe 85 PID 1340 wrote to memory of 2148 1340 03344799.exe 85 PID 1340 wrote to memory of 2148 1340 03344799.exe 85 PID 2148 wrote to memory of 4848 2148 Play.exe 86 PID 2148 wrote to memory of 4848 2148 Play.exe 86 PID 2148 wrote to memory of 4848 2148 Play.exe 86 PID 2148 wrote to memory of 4848 2148 Play.exe 86 PID 2148 wrote to memory of 4848 2148 Play.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\03344799.exe"C:\Users\Admin\AppData\Local\Temp\03344799.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Public"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Users\Public\Videos\Play.exeC:\Users\Public\Videos\Play.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe-arguments3⤵PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 5163⤵
- Program crash
PID:5072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2148 -ip 21481⤵PID:4260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
261KB
MD5dbac27d5cd59776c37c8647980259fbb
SHA181684544284fc77f2297f39fdfb004f835c7f55e
SHA256918f09129def9a8720ce512b77e77161e01d76849f0c9b21ee127be1e6202ec4
SHA512ff3080b47732d9c21b914d1d397d61b741847130319e49d85f258527dbfa0eb0e68801b6c125e32a2104c1227c149dc0aa0b35140ec975783636731631865010
-
Filesize
261KB
MD5dbac27d5cd59776c37c8647980259fbb
SHA181684544284fc77f2297f39fdfb004f835c7f55e
SHA256918f09129def9a8720ce512b77e77161e01d76849f0c9b21ee127be1e6202ec4
SHA512ff3080b47732d9c21b914d1d397d61b741847130319e49d85f258527dbfa0eb0e68801b6c125e32a2104c1227c149dc0aa0b35140ec975783636731631865010