Overview
overview
10Static
static
101106-01-Redline.exe
windows10-1703-x64
101106-01-Redline.exe
windows10-2004-x64
101106-02-Stealc.exe
windows10-1703-x64
101106-02-Stealc.exe
windows10-2004-x64
101106-03-Ag...la.exe
windows10-1703-x64
101106-03-Ag...la.exe
windows10-2004-x64
101106-04-Warzone.exe
windows10-1703-x64
101106-04-Warzone.exe
windows10-2004-x64
101106-05-Windigo.exe
windows10-1703-x64
71106-05-Windigo.exe
windows10-2004-x64
71106-06-Zgrat.exe
windows10-1703-x64
101106-06-Zgrat.exe
windows10-2004-x64
101106-07-Bl...er.exe
windows10-1703-x64
101106-07-Bl...er.exe
windows10-2004-x64
71106-08-Glupteba.exe
windows10-1703-x64
101106-08-Glupteba.exe
windows10-2004-x64
101106-09-Msfvenom.exe
windows10-1703-x64
101106-09-Msfvenom.exe
windows10-2004-x64
101106-10-Windigo.exe
windows10-1703-x64
71106-10-Windigo.exe
windows10-2004-x64
71106-11-Njrat.exe
windows10-1703-x64
101106-11-Njrat.exe
windows10-2004-x64
101106-12-Gh0st.dll
windows10-1703-x64
11106-12-Gh0st.dll
windows10-2004-x64
1Resubmissions
06-11-2023 19:37
231106-ybwfxadf81 1006-11-2023 19:33
231106-x9tjjadf4z 1006-11-2023 16:18
231106-tr58tscc9y 10Analysis
-
max time kernel
443s -
max time network
1169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2023 19:37
Behavioral task
behavioral1
Sample
1106-01-Redline.exe
Resource
win10-20231025-en
Behavioral task
behavioral2
Sample
1106-01-Redline.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
1106-02-Stealc.exe
Resource
win10-20231023-en
Behavioral task
behavioral4
Sample
1106-02-Stealc.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
1106-03-AgentTesla.exe
Resource
win10-20231020-en
Behavioral task
behavioral6
Sample
1106-03-AgentTesla.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
1106-04-Warzone.exe
Resource
win10-20231020-en
Behavioral task
behavioral8
Sample
1106-04-Warzone.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral9
Sample
1106-05-Windigo.exe
Resource
win10-20231023-en
Behavioral task
behavioral10
Sample
1106-05-Windigo.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
1106-06-Zgrat.exe
Resource
win10-20231020-en
Behavioral task
behavioral12
Sample
1106-06-Zgrat.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
1106-07-BlankGrabber.exe
Resource
win10-20231025-en
Behavioral task
behavioral14
Sample
1106-07-BlankGrabber.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
1106-08-Glupteba.exe
Resource
win10-20231020-en
Behavioral task
behavioral16
Sample
1106-08-Glupteba.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
1106-09-Msfvenom.exe
Resource
win10-20231023-en
Behavioral task
behavioral18
Sample
1106-09-Msfvenom.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
1106-10-Windigo.exe
Resource
win10-20231020-en
Behavioral task
behavioral20
Sample
1106-10-Windigo.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
1106-11-Njrat.exe
Resource
win10-20231025-en
Behavioral task
behavioral22
Sample
1106-11-Njrat.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
1106-12-Gh0st.dll
Resource
win10-20231023-en
Behavioral task
behavioral24
Sample
1106-12-Gh0st.dll
Resource
win10v2004-20231020-en
General
-
Target
1106-04-Warzone.exe
-
Size
191KB
-
MD5
996dd49201700930e0196a0b06f2a540
-
SHA1
96c2cacce22898106473c1caef52f52cef7bb86d
-
SHA256
d67122e881107797472553cc88f939e134c6443a435308e1333f4fb43dc59ff1
-
SHA512
76820043e1b61c3892c92fcd552bb539cf333d52de7ca73db118ef7981b930d864629bb8bd075ca8a48b97a9790eb209233f0ce77faa149dbbdc3e2f5f70583b
-
SSDEEP
3072:YkmlIja3IsCmIvI1zSIdPauWk9qtZHhUZ7OybN/AyoOzldQuoDm2heF1:YJ6aCtUzFUuMtZHx6zBZdQuoDVeF
Malware Config
Extracted
warzonerat
103.212.81.154:6028
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 3 IoCs
resource yara_rule behavioral8/memory/5068-5-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral8/memory/5068-9-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat behavioral8/memory/5068-11-0x0000000000400000-0x000000000055C000-memory.dmp warzonerat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1300 set thread context of 5068 1300 1106-04-Warzone.exe 92 -
Program crash 1 IoCs
pid pid_target Process procid_target 3812 5068 WerFault.exe 92 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92 PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92 PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92 PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92 PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92 PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92 PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92 PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92 PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92 PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92 PID 1300 wrote to memory of 5068 1300 1106-04-Warzone.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1106-04-Warzone.exe"C:\Users\Admin\AppData\Local\Temp\1106-04-Warzone.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 6523⤵
- Program crash
PID:3812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5068 -ip 50681⤵PID:4372