Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02-08-2023 12:12
Static task
static1
Behavioral task
behavioral1
Sample
Reservation.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Reservation.exe
Resource
win10v2004-20230703-en
General
-
Target
Reservation.exe
-
Size
203KB
-
MD5
c3d2671ab969fd347e6e0b81c777fc48
-
SHA1
43d9902d2a7b0583be43ef8d4023c81e9a776e52
-
SHA256
02ef992b9a587c6cdc382995b5dcfff0367554ec581a6fa28d08c70444f9e0d9
-
SHA512
588524f48b47f32b1d412a43a3f376bcfd717db8d8a74c85bf4823c1af51ccbffbd76579544620587c84e2fea1e7ede4e2d361fb348758d8572ee7345eccfc07
-
SSDEEP
6144:/Ya66WOW6k4nLUfQzcGg6Zwaidc8J1CQC:/YgWOE4EQIhairI
Malware Config
Extracted
warzonerat
plazzasecretballeronline.onedumb.com:14977
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2220-62-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral1/memory/2220-64-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral1/memory/2220-65-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral1/memory/2220-66-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral1/memory/2220-68-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat -
Loads dropped DLL 1 IoCs
pid Process 2500 Reservation.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Run\Acrobats = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe!!\\Acrobat.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\Reservation.exe\"" Reservation.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2500 set thread context of 2220 2500 Reservation.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2500 Reservation.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2220 2500 Reservation.exe 28 PID 2500 wrote to memory of 2220 2500 Reservation.exe 28 PID 2500 wrote to memory of 2220 2500 Reservation.exe 28 PID 2500 wrote to memory of 2220 2500 Reservation.exe 28 PID 2500 wrote to memory of 2220 2500 Reservation.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Reservation.exe"C:\Users\Admin\AppData\Local\Temp\Reservation.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Reservation.exe"C:\Users\Admin\AppData\Local\Temp\Reservation.exe"2⤵PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5c9915e219a2d249f9b1f062b6a41530c
SHA19d230c9ea12189f5f351d864537108f32e7e7c0d
SHA25683f19467ccf72ef1f39f298f2f91a512cce6021e8f81bc98a249225640cb29b8
SHA5120be72a569a30155ec9c8ae389e867834063ca18c28ce529ce5ecce5e6552d536f9ffd3b28e6e3cb99a70c2c0d5548bf6331ec46ff90da1ee3a92c626110551ec