Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order #PO-RBL-156502125498590-0333.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Purchase Order #PO-RBL-156502125498590-0333.exe
Resource
win10v2004-20230915-en
General
-
Target
Purchase Order #PO-RBL-156502125498590-0333.exe
-
Size
86KB
-
MD5
535f5cf42f36a22ffa738a56a4fdf161
-
SHA1
c3578651fb4f0720b4d14ecd5d9427aaff60b4fc
-
SHA256
0654a66a1584a3924f5020f6bf641d1cd3a93864e040a15e13f3e5a07290817f
-
SHA512
0eb296089610afd75dcf60197df0a4b063c81cc2aa5c4763ef1f5f988653c46f643c8bb3969f42a938d1c0408d3423ef6bf4885e80ccffff6548753cbc8933a8
-
SSDEEP
1536:8w1IXWFN5/V7LVV9zaaavghKd9QzGBa+/bVGpGR1T:8w1IXW5/V3z9zHAOnQ7T
Malware Config
Extracted
warzonerat
84.38.132.126:63030
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3792-14-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/3792-19-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/3792-20-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral2/memory/3792-21-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Purchase Order #PO-RBL-156502125498590-0333 = "C:\\Users\\Admin\\Documents\\Purchase Order #PO-RBL-156502125498590-0333.pif" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3384 set thread context of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98 -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 3384 Purchase Order #PO-RBL-156502125498590-0333.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3384 Purchase Order #PO-RBL-156502125498590-0333.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3384 wrote to memory of 4736 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 93 PID 3384 wrote to memory of 4736 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 93 PID 3384 wrote to memory of 4736 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 93 PID 4736 wrote to memory of 1800 4736 cmd.exe 95 PID 4736 wrote to memory of 1800 4736 cmd.exe 95 PID 4736 wrote to memory of 1800 4736 cmd.exe 95 PID 3384 wrote to memory of 1996 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 97 PID 3384 wrote to memory of 1996 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 97 PID 3384 wrote to memory of 1996 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 97 PID 3384 wrote to memory of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98 PID 3384 wrote to memory of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98 PID 3384 wrote to memory of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98 PID 3384 wrote to memory of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98 PID 3384 wrote to memory of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98 PID 3384 wrote to memory of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98 PID 3384 wrote to memory of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98 PID 3384 wrote to memory of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98 PID 3384 wrote to memory of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98 PID 3384 wrote to memory of 3792 3384 Purchase Order #PO-RBL-156502125498590-0333.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO-RBL-156502125498590-0333.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO-RBL-156502125498590-0333.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Purchase Order #PO-RBL-156502125498590-0333" /t REG_SZ /F /D "C:\Users\Admin\Documents\Purchase Order #PO-RBL-156502125498590-0333.pif"2⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Purchase Order #PO-RBL-156502125498590-0333" /t REG_SZ /F /D "C:\Users\Admin\Documents\Purchase Order #PO-RBL-156502125498590-0333.pif"3⤵
- Adds Run key to start application
PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c Copy "C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO-RBL-156502125498590-0333.exe" "C:\Users\Admin\Documents\Purchase Order #PO-RBL-156502125498590-0333.pif"2⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO-RBL-156502125498590-0333.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order #PO-RBL-156502125498590-0333.exe"2⤵PID:3792
-