Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23-10-2023 17:32
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe
-
Size
1003KB
-
MD5
818f32d7b8abb99fdfb0c28e2e971064
-
SHA1
09f06d3690420c524366c241f0fc04ddf101c948
-
SHA256
8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559c
-
SHA512
2aab73204bc41aa2c8a91b9be295cea4b6ef3ca8c377027994fb2258c5ddafc791ef5644f0dc4938a612e36a2e49dbff3e24f6f7d02b7d2b915cb99235b2f4f6
-
SSDEEP
12288:GBvSZbk0WXlBx4+K5jFY4IGW5SDTrWRJmSqKp9TV1gSx1yN5K7q:DPj0GNTyRJ0jKG
Malware Config
Extracted
warzonerat
38.255.42.252:5678
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 6 IoCs
resource yara_rule behavioral1/memory/2800-12-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/2800-13-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/2800-15-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/2800-16-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/2800-18-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat behavioral1/memory/2800-21-0x0000000000400000-0x0000000000554000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 764 set thread context of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2832 2800 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 764 wrote to memory of 2800 764 NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe 28 PID 2800 wrote to memory of 2832 2800 MSBuild.exe 29 PID 2800 wrote to memory of 2832 2800 MSBuild.exe 29 PID 2800 wrote to memory of 2832 2800 MSBuild.exe 29 PID 2800 wrote to memory of 2832 2800 MSBuild.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8babd1b12db5aa7c49b748e6cd0a558e8eba4c694f439e9258ac50d7fccf559cexe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 2003⤵
- Program crash
PID:2832
-
-