Analysis
-
max time kernel
65s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05-07-2023 06:16
Static task
static1
Behavioral task
behavioral1
Sample
c7e68f6c127994363927fda99e96c53e.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
c7e68f6c127994363927fda99e96c53e.exe
Resource
win10v2004-20230703-en
General
-
Target
c7e68f6c127994363927fda99e96c53e.exe
-
Size
2.5MB
-
MD5
c7e68f6c127994363927fda99e96c53e
-
SHA1
9f88fa05eead627838d9b114fcb27121f0148bf6
-
SHA256
ff49f132c704dd427042dcd0a58c5522be6e165c40efdeb17c042217f3b0fe9c
-
SHA512
b02732aba26620700680c457cb95eff326f150826c51daea82f0f517121a29fdc19679f600ccedaf07d1b6928303ca759bc6533a2ed9d287e5330e5c6bb2a366
-
SSDEEP
24576:B47stUFlg46o/LJiFBIbGAq4OCgwYM/wARmPj5tS7vp1LX7J4Cx4G2FYkr:B4wtUFlg4/2i4pFYk
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2176-1384-0x0000000002360000-0x00000000024BC000-memory.dmp warzonerat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1724861073-2584418204-2594431177-1000\Software\Microsoft\Windows\CurrentVersion\Run\Iokkotxpfm = "C:\\Users\\Admin\\AppData\\Roaming\\Iokkotxpfm.exe" c7e68f6c127994363927fda99e96c53e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2704 2176 WerFault.exe 28 -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2540 ipconfig.exe 844 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2176 c7e68f6c127994363927fda99e96c53e.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1664 2176 c7e68f6c127994363927fda99e96c53e.exe 29 PID 2176 wrote to memory of 1664 2176 c7e68f6c127994363927fda99e96c53e.exe 29 PID 2176 wrote to memory of 1664 2176 c7e68f6c127994363927fda99e96c53e.exe 29 PID 2176 wrote to memory of 1664 2176 c7e68f6c127994363927fda99e96c53e.exe 29 PID 1664 wrote to memory of 2540 1664 cmd.exe 31 PID 1664 wrote to memory of 2540 1664 cmd.exe 31 PID 1664 wrote to memory of 2540 1664 cmd.exe 31 PID 1664 wrote to memory of 2540 1664 cmd.exe 31 PID 2176 wrote to memory of 2228 2176 c7e68f6c127994363927fda99e96c53e.exe 32 PID 2176 wrote to memory of 2228 2176 c7e68f6c127994363927fda99e96c53e.exe 32 PID 2176 wrote to memory of 2228 2176 c7e68f6c127994363927fda99e96c53e.exe 32 PID 2176 wrote to memory of 2228 2176 c7e68f6c127994363927fda99e96c53e.exe 32 PID 2228 wrote to memory of 844 2228 cmd.exe 34 PID 2228 wrote to memory of 844 2228 cmd.exe 34 PID 2228 wrote to memory of 844 2228 cmd.exe 34 PID 2228 wrote to memory of 844 2228 cmd.exe 34 PID 2176 wrote to memory of 2704 2176 c7e68f6c127994363927fda99e96c53e.exe 35 PID 2176 wrote to memory of 2704 2176 c7e68f6c127994363927fda99e96c53e.exe 35 PID 2176 wrote to memory of 2704 2176 c7e68f6c127994363927fda99e96c53e.exe 35 PID 2176 wrote to memory of 2704 2176 c7e68f6c127994363927fda99e96c53e.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7e68f6c127994363927fda99e96c53e.exe"C:\Users\Admin\AppData\Local\Temp\c7e68f6c127994363927fda99e96c53e.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 6202⤵
- Program crash
PID:2704
-