Analysis
-
max time kernel
136s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 14:29
Behavioral task
behavioral1
Sample
0x000700000001b02f-13.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0x000700000001b02f-13.exe
Resource
win10v2004-20230915-en
General
-
Target
0x000700000001b02f-13.exe
-
Size
141KB
-
MD5
8924c729f5b74dce861ebbe8170c1e24
-
SHA1
996451edb9e8b09a9f126107413c22d071ceb635
-
SHA256
56fc109c624733be74c8222cf04b939537455c3c0c41401878d385a49a698314
-
SHA512
242142e1fd729e8bf1e2e396b185e7eefcca8ea94d023698fa4b6b49a5b585d29c9a9e3cee23ac62e1d196493f500f0a999d1c2e95b63dc184b74a77732e5936
-
SSDEEP
3072:2k4aHUBOO36YplMqBB3ZcPxlG+bBsDHqYzHKG0qIwj:2dx3wqz3ZcDeDKYzqG01wj
Malware Config
Extracted
warzonerat
fgudhiiugiufgifufgihdhuidfxgd.duckdns.org:5200
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0006000000023225-22.dat warzonerat behavioral2/files/0x0006000000023225-23.dat warzonerat -
Executes dropped EXE 1 IoCs
pid Process 3388 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\Documents\\svchost.exe" 0x000700000001b02f-13.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4256 powershell.exe 4256 powershell.exe 4476 powershell.exe 4476 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4256 powershell.exe Token: SeDebugPrivilege 4476 powershell.exe Token: 33 3716 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3716 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4256 4104 0x000700000001b02f-13.exe 86 PID 4104 wrote to memory of 4256 4104 0x000700000001b02f-13.exe 86 PID 4104 wrote to memory of 4256 4104 0x000700000001b02f-13.exe 86 PID 4104 wrote to memory of 3388 4104 0x000700000001b02f-13.exe 90 PID 4104 wrote to memory of 3388 4104 0x000700000001b02f-13.exe 90 PID 4104 wrote to memory of 3388 4104 0x000700000001b02f-13.exe 90 PID 3388 wrote to memory of 4476 3388 svchost.exe 91 PID 3388 wrote to memory of 4476 3388 svchost.exe 91 PID 3388 wrote to memory of 4476 3388 svchost.exe 91 PID 3388 wrote to memory of 3100 3388 svchost.exe 93 PID 3388 wrote to memory of 3100 3388 svchost.exe 93 PID 3388 wrote to memory of 3100 3388 svchost.exe 93 PID 3388 wrote to memory of 3100 3388 svchost.exe 93 PID 3388 wrote to memory of 3100 3388 svchost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000700000001b02f-13.exe"C:\Users\Admin\AppData\Local\Temp\0x000700000001b02f-13.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Users\Admin\Documents\svchost.exe"C:\Users\Admin\Documents\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:3100
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x460 0x4041⤵
- Suspicious use of AdjustPrivilegeToken
PID:3716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD56fa4efdb39500f1669832305a5ea5a8f
SHA1ac88e9402e739c0f45edc939a9ed59b3c0329dde
SHA256bd402b761d5eb7d711c5efc75950e07d00ec874e0e25549c70c2fc60b5168271
SHA51215f41d3b0e9f5a854f779e610ae3ced79829b89f86690181bab08682676dabcc2020638eaab88981b26b6df9e6dfe571581981ac698cb18ae09aa2c2b74804c6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
141KB
MD58924c729f5b74dce861ebbe8170c1e24
SHA1996451edb9e8b09a9f126107413c22d071ceb635
SHA25656fc109c624733be74c8222cf04b939537455c3c0c41401878d385a49a698314
SHA512242142e1fd729e8bf1e2e396b185e7eefcca8ea94d023698fa4b6b49a5b585d29c9a9e3cee23ac62e1d196493f500f0a999d1c2e95b63dc184b74a77732e5936
-
Filesize
141KB
MD58924c729f5b74dce861ebbe8170c1e24
SHA1996451edb9e8b09a9f126107413c22d071ceb635
SHA25656fc109c624733be74c8222cf04b939537455c3c0c41401878d385a49a698314
SHA512242142e1fd729e8bf1e2e396b185e7eefcca8ea94d023698fa4b6b49a5b585d29c9a9e3cee23ac62e1d196493f500f0a999d1c2e95b63dc184b74a77732e5936